First published: Wed Jan 18 2017(Updated: )
Apache could allow a remote attacker to execute arbitrary code on the system, caused by a LDAP entry poisoning vulnerability in main/java/org/apache/directory/groovyldap/LDAP.java. By leveraging setting returnObjFlag to true for all search methods, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM GDE | <=3.0.0.2 | |
Apache Groovy Ldap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6497 is a LDAP entry poisoning vulnerability in the Groovy LDAP API in Apache, which allows a remote attacker to execute arbitrary code on the system.
The severity of CVE-2016-6497 is high, with a severity value of 7.5.
An attacker can exploit CVE-2016-6497 by leveraging the setting returnObjFlag to true for all search methods in the LDAP.java file.
IBM GDE version 3.0.0.2 and Apache Groovy LDAP are affected by CVE-2016-6497.
Update the Groovy LDAP API in Apache to the latest version and apply any patches provided by the vendor.