First published: Wed Apr 01 2020(Updated: )
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Druid | =0.17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1958 is a vulnerability in Apache Druid 0.17.0 that allows callers with valid LDAP credentials to bypass the credentialsValidator.userSearch filter barrier.
LDAP authentication in Apache Druid 0.17.0 allows users to authenticate with the system using their LDAP credentials.
The impact of CVE-2020-1958 is that users with valid LDAP credentials can bypass the authentication filter and potentially gain unauthorized access to Druid APIs.
You can check if your Apache Druid version is affected by CVE-2020-1958 by verifying if you are running version 0.17.0.
To mitigate CVE-2020-1958, it is recommended to upgrade to a patched version of Apache Druid that addresses this vulnerability.