First published: Mon Jul 26 2021(Updated: )
While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Directory Studio | <=1.5.3 | |
Apache Directory Studio | =2.0.0-milestone1 | |
Apache Directory Studio | =2.0.0-milestone10 | |
Apache Directory Studio | =2.0.0-milestone11 | |
Apache Directory Studio | =2.0.0-milestone12 | |
Apache Directory Studio | =2.0.0-milestone13 | |
Apache Directory Studio | =2.0.0-milestone14 | |
Apache Directory Studio | =2.0.0-milestone15 | |
Apache Directory Studio | =2.0.0-milestone16 | |
Apache Directory Studio | =2.0.0-milestone2 | |
Apache Directory Studio | =2.0.0-milestone3 | |
Apache Directory Studio | =2.0.0-milestone4 | |
Apache Directory Studio | =2.0.0-milestone5 | |
Apache Directory Studio | =2.0.0-milestone6 | |
Apache Directory Studio | =2.0.0-milestone7 | |
Apache Directory Studio | =2.0.0-milestone8 | |
Apache Directory Studio | =2.0.0-milestone9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33900 is classified as Medium due to the lack of StartTLS encryption during SASL authentication.
To fix CVE-2021-33900, you should upgrade to a non-vulnerable version of Apache Directory Studio that correctly implements StartTLS for SASL mechanisms.
CVE-2021-33900 affects Apache Directory Studio versions up to 1.5.3 and all milestone releases of version 2.0.0.
Using an affected version may expose sensitive data over the network, as it does not enforce encryption during SASL authentication.
Currently, the recommended action is to upgrade to the latest version of Apache Directory Studio, as there is no documented workaround for this vulnerability.