ID CVE-2016-8750
Summary Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:karaf:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.3.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:3.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:3.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.0:milestone1:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.0:milestone1:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.0:milestone2:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.0:milestone2:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.0:milestone3:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.0:milestone3:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:karaf:4.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:karaf:4.0.7:*:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 26-04-2019 - 13:16)
Impact:
Exploitability:
CWE CWE-90
CAPEC
  • LDAP Injection
    An attacker manipulates or crafts an LDAP query for the purpose of undermining the security of the target. Some applications use user input to create LDAP queries that are processed by an LDAP server. For example, a user might provide their username during authentication and the username might be inserted in an LDAP query during the authentication process. An attacker could use this input to inject additional commands into an LDAP query that could disclose sensitive information. For example, entering a * in the aforementioned query might return information about all users on the system. This attack is very similar to an SQL injection attack in that it manipulates a query to gather additional information or coerce a particular return value.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:N/A:P
redhat via4
advisories
rhsa
id RHSA-2018:1322
refmap via4
bid 103098
confirm https://karaf.apache.org/security/cve-2016-8750.txt
Last major update 26-04-2019 - 13:16
Published 19-02-2018 - 15:29
Last modified 26-04-2019 - 13:16
Back to Top