Description
main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods.
Remediation
References
http://svn.apache.org/viewvc/directory/sandbox/szoerner/groovyldap/src/main/java/org/apache/directory/groovyldap/LDAP.java?r1=1765362&r2=1765361&pathrev=1765362&view=patch
http://www.securityfocus.com/bid/95929
https://mail-archives.apache.org/mod_mbox/directory-users/201610.mbox/%3Cb7d7e909-a8ed-1ab4-c853-4078c1e7624a%40stefan-seelmann.de%3E
https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Related Vulnerabilities
CVE-2022-25312 Vulnerability in maven package org.apache.any23:apache-any23
CVE-2018-20677 Vulnerability in npm package bootstrap
CVE-2018-16489 Vulnerability in maven package org.webjars.npm:just-extend
CVE-2019-25103 Vulnerability in npm package simple-markdown
CVE-2022-41251 Vulnerability in maven package org.jenkins-ci.plugins:apprenda