Description
main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods.
Remediation
References
http://svn.apache.org/viewvc/directory/sandbox/szoerner/groovyldap/src/main/java/org/apache/directory/groovyldap/LDAP.java?r1=1765362&r2=1765361&pathrev=1765362&view=patch
http://www.securityfocus.com/bid/95929
https://mail-archives.apache.org/mod_mbox/directory-users/201610.mbox/%3Cb7d7e909-a8ed-1ab4-c853-4078c1e7624a%40stefan-seelmann.de%3E
https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Related Vulnerabilities
CVE-2020-7626 Vulnerability in npm package karma-mojo
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-trino
CVE-2023-34434 Vulnerability in maven package org.apache.inlong:manager-pojo
CVE-2019-10753 Vulnerability in maven package com.diffplug.spotless:spotless-eclipse-wtp
CVE-2021-4264 Vulnerability in maven package org.webjars:dustjs-linkedin