[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-7937?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

John Kinsella updated CLOUDSTACK-7937:
--------------------------------------
    Security: Public  (was: Non-Public)

> CloudStack accepts unauthenticated LDAP binds
> ---------------------------------------------
>
>                 Key: CLOUDSTACK-7937
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-7937
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the 
> default.) 
>          Components: Management Server
>            Reporter: John Kinsella
>            Assignee: Rajani Karuturi
>            Priority: Critical
>              Labels: security
>         Attachments: 
> 43-0001-Fixed-CLOUDSTACK-7937-CloudStack-accepts-unauthentic.patch, 
> 44-0001-Fixed-CLOUDSTACK-7937-CloudStack-accepts-unauthentic.patch
>
>
> Description:
> Apache CloudStack may be configured to authenticate LDAP users.  When so 
> configured, it performs a simple LDAP bind with the name and password 
> provided by a user.  Simple LDAP binds are defined with three mechanisms (RFC 
> 4513): 1) username and password; 2) unauthenticated if only a username is 
> specified; and 3) anonymous if neither username or password is specified.  
> Currently, Apache CloudStack does not check if the password was provided 
> which could allow an attacker to bind as an unauthenticated user.
> Mitigation:
> This issue has been fixed in CloudStack versions 4.3.2 and 4.4.2. Please 
> upgrade to the latest version.
> By default, many LDAP servers are not configured to allow unauthenticated 
> binds.  If the LDAP server in use allow this behaviour, a potential interim 
> solution would be to consider disabling unauthenticated binds.
> Credit:
> This issue was identified by the Citrix Security Team.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to