#VU72082 Weak password requirements in UnboundID LDAP SDK for Java - CVE-2018-1000134


Vulnerability identifier: #VU72082

Vulnerability risk: High

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-1000134

CWE-ID: CWE-521

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
UnboundID LDAP SDK for Java
Universal components / Libraries / Software for developers

Vendor: Ping Identity

Description

The vulnerability allows an attacker to compromise the affected application.

The vulnerability exists due to the application does not check for empty passwords when running in synchronous mode. A remote attacker can provide a valid username with an empty password and gain unauthorized access to the application.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

UnboundID LDAP SDK for Java: before 4.0.5


External links
https://github.com/pingidentity/ldapsdk/issues/40
https://github.com/pingidentity/ldapsdk/commit/8471904a02438c03965d21367890276bc25fa5a6#diff-f6cb23b459be1ec17df1da33760087fd


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability