CVE-2017-14623 — Improper Authentication in Go-ldap Ldap
Severity
8.1HIGHNVD
EPSS
0.3%
top 44.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 20
Latest updateAug 21
Description
In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil return value is interpreted as successful authorization) and (2) it is used with an LDAP server allowing unauthenticated bind.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages7 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
3Microsoft▶
In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1)↗2017-09-12
Debian▶
CVE-2017-14623: golang-github-go-ldap-ldap - In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be ab...↗2017