-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.cloudfoundry.identity:cloudfoundry-identity-server | maven | >= 3.0.0, < 3.3.0.3 | 3.3.0.3 |
| org.cloudfoundry.identity:cloudfoundry-identity-server | maven | >= 3.4.0, < 3.4.2 | 3.4.2 |
The vulnerability stems from improper certificate validation in LDAP SSL/TLS connections. The key commit diffs show the fix introduced X509ExpiryCheckingTrustManager to validate() certificate expiration. In vulnerable versions, the ProcessLdapProperties.process() method configured the LDAP socket factory without this expiry check when SSL validation was enabled. This allowed the system to accept expired certificates because the default TrustManager (used when SSL verification was enabled) did not explicitly check certificate validity periods. The vulnerable function is identified by analyzing where certificate validation logic was missing before the patch.