cnvd-2017-27761
Vulnerability from cnvd
Title
Joomla! LDAP注入漏洞
Description
Joomla!是美国Open Source Matters团队开发的一套开源的内容管理系统(CMS)。
Joomla! 3.7.5及之前版本的系统在开启LDAP认证的情况下存在注入漏洞,该漏洞源于LDAP校验时用到的ldap_search函数未对用户提交的数据进行过滤导致注入,远程攻击者可通过该漏洞获取包括管理员等任意用户的密码。
Severity
高
VLAI Severity ?
Patch Name
Joomla! LDAP注入漏洞的补丁
Patch Description
Joomla!是美国Open Source Matters团队开发的一套开源的内容管理系统(CMS)。
Joomla! 3.7.5及之前版本的系统在开启LDAP认证的情况下存在注入漏洞,该漏洞源于LDAP校验时用到的ldap_search函数未对用户提交的数据进行过滤导致注入,远程攻击者可通过该漏洞获取包括管理员等任意用户的密码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
Joomla!官方已经发布了新版本3.8.0解决了该漏洞,请受影响的用户及时下载使用新版本来防护该漏洞: https://downloads.joomla.org/
Reference
https://nvd.nist.gov/vuln/detail/CVE-2017-14596
https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/
https://www.joomla.org/announcements.html
https://developer.joomla.org/security-centre/711-20170902-core-ldap-information-disclosure
Impacted products
| Name | Joomla! Joomla! <=3.7.5 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-14596"
}
},
"description": "Joomla!\u662f\u7f8e\u56fdOpen Source Matters\u56e2\u961f\u5f00\u53d1\u7684\u4e00\u5957\u5f00\u6e90\u7684\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf(CMS)\u3002\r\n\r\nJoomla! 3.7.5\u53ca\u4e4b\u524d\u7248\u672c\u7684\u7cfb\u7edf\u5728\u5f00\u542fLDAP\u8ba4\u8bc1\u7684\u60c5\u51b5\u4e0b\u5b58\u5728\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eLDAP\u6821\u9a8c\u65f6\u7528\u5230\u7684ldap_search\u51fd\u6570\u672a\u5bf9\u7528\u6237\u63d0\u4ea4\u7684\u6570\u636e\u8fdb\u884c\u8fc7\u6ee4\u5bfc\u81f4\u6ce8\u5165\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8be5\u6f0f\u6d1e\u83b7\u53d6\u5305\u62ec\u7ba1\u7406\u5458\u7b49\u4efb\u610f\u7528\u6237\u7684\u5bc6\u7801\u3002",
"discovererName": "unknow",
"formalWay": "Joomla!\u5b98\u65b9\u5df2\u7ecf\u53d1\u5e03\u4e86\u65b0\u7248\u672c3.8.0\u89e3\u51b3\u4e86\u8be5\u6f0f\u6d1e\uff0c\u8bf7\u53d7\u5f71\u54cd\u7684\u7528\u6237\u53ca\u65f6\u4e0b\u8f7d\u4f7f\u7528\u65b0\u7248\u672c\u6765\u9632\u62a4\u8be5\u6f0f\u6d1e\uff1a \r\nhttps://downloads.joomla.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-27761",
"openTime": "2017-09-21",
"patchDescription": "Joomla!\u662f\u7f8e\u56fdOpen Source Matters\u56e2\u961f\u5f00\u53d1\u7684\u4e00\u5957\u5f00\u6e90\u7684\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf(CMS)\u3002\r\n\r\nJoomla! 3.7.5\u53ca\u4e4b\u524d\u7248\u672c\u7684\u7cfb\u7edf\u5728\u5f00\u542fLDAP\u8ba4\u8bc1\u7684\u60c5\u51b5\u4e0b\u5b58\u5728\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eLDAP\u6821\u9a8c\u65f6\u7528\u5230\u7684ldap_search\u51fd\u6570\u672a\u5bf9\u7528\u6237\u63d0\u4ea4\u7684\u6570\u636e\u8fdb\u884c\u8fc7\u6ee4\u5bfc\u81f4\u6ce8\u5165\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8be5\u6f0f\u6d1e\u83b7\u53d6\u5305\u62ec\u7ba1\u7406\u5458\u7b49\u4efb\u610f\u7528\u6237\u7684\u5bc6\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Joomla! LDAP\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Joomla! Joomla! \u003c=3.7.5"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-14596\r\nhttps://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/ \r\nhttps://www.joomla.org/announcements.html\r\nhttps://developer.joomla.org/security-centre/711-20170902-core-ldap-information-disclosure",
"serverity": "\u9ad8",
"submitTime": "2017-09-21",
"title": "Joomla! LDAP\u6ce8\u5165\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…