CVE-2022-46337:
Apache Derby: LDAP injection vulnerability in authenticator
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
11/20/2023
Updated
1/22/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.derby:derby | maven | >= 10.1.1.0, < 10.14.3 | 10.14.3 |
org.apache.derby:derby | maven | >= 10.15.0.0, < 10.15.2.1 | 10.15.2.1 |
org.apache.derby:derby | maven | >= 10.16.0.0, < 10.16.1.2 | 10.16.1.2 |
org.apache.derby:derby | maven | >= 10.17.0.0, < 10.17.1.0 | 10.17.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The JIRA ticket DERBY-7147 explicitly identifies getDNFromUID() in LDAPAuthenticationSchemeImpl as the vulnerable method. The vulnerability stems from improper neutralization of username input when building LDAP queries, matching CWE-74 (Injection). The fix involved adding LDAP search filter escaping, confirming this function's role in the injection vector. The file path is inferred from standard Derby package structures and authentication implementation patterns.