Miggo Logo

CVE-2023-28857:
Apereo CAS vulnerable to credential leaks for LDAP authentication

4

CVSS Score
3.1

Basic Information

EPSS Score
0.42368%
Published
8/5/2024
Updated
8/5/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apereo.cas:cas-server-support-x509-coremaven>= 6.5.0, < 6.6.66.6.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs because X509CredentialsAuthenticationHandler's validate method delegates CRL checks to a revocation checker that fetches URLs from untrusted certificate extensions. When LDAP credentials are configured, the same credentials are reused for CRL fetching from arbitrary LDAP URLs. The code shows direct invocation of revocationChecker.check(cert) without URL validation, and the advisory explicitly mentions this flow as the leak vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p*r*o **S is *n op*n sour** multilin*u*l sin*l* si*n-on solution *or t** w**. *p*r*o **S **n ** *on*i*ur** to us* *ut**nti**tion **s** on *li*nt X*** **rti*i**t*s. T**s* **rti*i**t*s **n ** provi*** vi* TLS **n*s**k* or * sp**i*l *TTP *****r, su** *

Reasoning

T** vuln*r**ility o**urs ****us* X****r***nti*ls*ut**nti**tion**n*l*r's v*li**t* m*t*o* **l***t*s *RL ****ks to * r*vo**tion ****k*r t**t **t***s URLs *rom untrust** **rti*i**t* *xt*nsions. W**n L**P *r***nti*ls *r* *on*i*ur**, t** s*m* *r***nti*ls *