CVE-2017-14623Improper Authentication in Go-ldap Ldap

Severity
8.1HIGHNVD
EPSS
0.3%
top 44.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 20
Latest updateAug 21

Description

In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil return value is interpreted as successful authorization) and (2) it is used with an LDAP server allowing unauthenticated bind.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages7 packages

Gogithub.com/go-ldap_ldap< 2.5.0+incompatible+1
debiandebian/golang-github-go-ldap-ldap< golang-github-go-ldap-ldap 2.5.1-1 (bookworm)

Patches

🔴Vulnerability Details

4
OSV
Access Restriction Bypass in go-ldap in github.com/go-ldap/ldap2024-08-21
GHSA
Access Restriction Bypass in go-ldap2022-02-15
OSV
Access Restriction Bypass in go-ldap2022-02-15
OSV
CVE-2017-14623: In the ldap2017-09-20

📋Vendor Advisories

3
Microsoft
In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1)2017-09-12
Red Hat
gopkg.in-ldap.v2: Authentication bypass via empty password2017-08-24
Debian
CVE-2017-14623: golang-github-go-ldap-ldap - In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be ab...2017

📐Framework References

1
CWE
Improper Authentication

💬Community

1
Bugzilla
CVE-2017-14623 gopkg.in-ldap.v2: Authentication bypass via empty password2017-09-21