Skip to content

Credentials bypass in Apache Druid

Moderate severity GitHub Reviewed Published Feb 9, 2022 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

maven org.apache.druid:druid (Maven)

Affected versions

= 0.17.0

Patched versions

0.17.1

Description

When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.

References

Published by the National Vulnerability Database Apr 1, 2020
Reviewed Apr 5, 2021
Published to the GitHub Advisory Database Feb 9, 2022
Last updated Feb 1, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE ID

CVE-2020-1958

GHSA ID

GHSA-qh2g-7h5p-mxf4

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.