First published: Fri Jun 19 2020(Updated: )
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Archiva | <2.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9495 is a vulnerability in the Apache Archiva login service before version 2.2.5 that allows an attacker to perform LDAP injection.
CVE-2020-9495 allows an attacker to retrieve user attribute data from the connected LDAP server by modifying the LDAP filter used in the login form.
CVE-2020-9495 has a severity level of medium with a CVSS score of 5.3.
To fix the CVE-2020-9495 vulnerability, update Apache Archiva to version 2.2.5 or later.
You can find more information about CVE-2020-9495 on the Apache Archiva security page and the provided references.