Miggo Logo

CVE-2022-46337:
Apache Derby: LDAP injection vulnerability in authenticator

9.8

CVSS Score

Basic Information

EPSS Score
-
Published
11/20/2023
Updated
1/22/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.derby:derbymaven>= 10.1.1.0, < 10.14.310.14.3
org.apache.derby:derbymaven>= 10.15.0.0, < 10.15.2.110.15.2.1
org.apache.derby:derbymaven>= 10.16.0.0, < 10.16.1.210.16.1.2
org.apache.derby:derbymaven>= 10.17.0.0, < 10.17.1.010.17.1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The JIRA ticket DERBY-7147 explicitly identifies getDNFromUID() in LDAPAuthenticationSchemeImpl as the vulnerable method. The vulnerability stems from improper neutralization of username input when building LDAP queries, matching CWE-74 (Injection). The fix involved adding LDAP search filter escaping, confirming this function's role in the injection vector. The file path is inferred from standard Derby package structures and authentication implementation patterns.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*v*rly **vis** us*rn*m* mi**t *yp*ss L**P *ut**nti**tion ****ks. In L**P-*ut**nti**t** **r*y inst*ll*tions, t*is *oul* l*t *n *tt**k*r *ill up t** *isk *y *r**tin* junk **r*y **t***s*s. In L**P-*ut**nti**t** **r*y inst*ll*tions, t*is *oul* *lso *

Reasoning

T** JIR* ti*k*t **R*Y-**** *xpli*itly i**nti*i*s **t*N*romUI*() in L**P*ut**nti**tionS***m*Impl *s t** vuln*r**l* m*t*o*. T** vuln*r**ility st*ms *rom improp*r n*utr*liz*tion o* us*rn*m* input w**n *uil*in* L**P qu*ri*s, m*t**in* *W*-** (Inj**tion).