Lucene search

K
hackeroneWhoisbinitH1:1278891
HistoryJul 27, 2021 - 9:42 a.m.

U.S. Dept Of Defense: [CVE-2021-29156] LDAP Injection at https://██████

2021-07-2709:42:39
whoisbinit
hackerone.com
61

0.365 Low

EPSS

Percentile

97.2%

Description:
https://█████ is vulnerable to CVE-2021-29156

References

Impact

ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.

System Host(s)

███████

Affected Product(s) and Version(s)

CVE Numbers

CVE-2021-29156

Steps to Reproduce

The references mentioned shall be helpful for successful reproduction, especially the one I reported the earlier day (#1278050) and the PortSwigger one.

For 200 OK response, it also throws out OpenAM instance address: ███

Similar thing can be done for password enumeration as well. You can find the scripts I wrote for username and password enumeration in my earlier report at a different host.

Suggested Mitigation/Remediation Actions

0.365 Low

EPSS

Percentile

97.2%