[ https://issues.apache.org/jira/browse/DERBY-7147?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17799501#comment-17799501 ]
Florian Kolbe commented on DERBY-7147: -------------------------------------- {quote} The patch has been backported to the 10.14 branch. If you build Derby jars from the head of that branch, you will have a version of Derby which includes the fix and which runs on Java 8. {quote} why can't Apache release an official version for 10.14 !? Is one expected to build it yourself? How would a vulnerability database react to such a version? https://issues.apache.org/jira/projects/DERBY/versions/12343242 > LDAP injection vulnerability in LDAPAuthenticationSchemeImpl > ------------------------------------------------------------ > > Key: DERBY-7147 > URL: https://issues.apache.org/jira/browse/DERBY-7147 > Project: Derby > Issue Type: Bug > Components: JDBC > Affects Versions: 10.16.1.1 > Reporter: Richard N. Hillegas > Assignee: Richard N. Hillegas > Priority: Major > Fix For: 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 > > Attachments: LDAPauthenticationVulnerability.pdf, > derby-7147-01-aa-reformatForReadability.diff, > derby-7147-02-aa-escapeLDAPsearchFilter.diff, > derby-7147-02-ab-escapeLDAPsearchFilter.diff, > derby-7147-03-aa-updateLDAPinstructions.diff, > derby-7147-03-aa-updateLDAPinstructions.tar, > derby-7147-03-ab-updateLDAPinstructions.diff, > derby-7147-03-ab-updateLDAPinstructions.tar, > derby-7147-04-aa-pointLDAPTestAtInstructions.diff, releaseNote.html > > > An LDAP injection vulnerability has been identified in > LDAPAuthenticationSchemeImpl.getDNFromUID(). An exploit has not been > provided, but there is a possibility that an intruder could bypass > authentication checks in Derby-powered applications which rely on external > LDAP servers. > For more information on LDAP injection, see > https://www.synopsys.com/glossary/what-is-ldap-injection.html -- This message was sent by Atlassian Jira (v8.20.10#820010)