CVE-2020-15813

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15813
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15813.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15813
Aliases
Published
2020-07-17T19:15:12Z
Modified
2024-05-14T07:51:07.379Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not implement proper certificate validation (regardless of whether the "Allow self-signed certificates" option is used). Therefore, any attacker with the ability to intercept network traffic between a Graylog server and an LDAP server is able to redirect traffic to a different LDAP server (unnoticed by the Graylog server due to the lack of certificate validation), effectively bypassing Graylog's authentication mechanism.

References

Affected packages

Git / github.com/graylog2/graylog2-server

Affected ranges

Type
GIT
Repo
https://github.com/graylog2/graylog2-server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.10.0-preview.2
0.10.0-rc.1
0.10.0-rc.2
0.10.0-rc.3
0.10.0-rc.4
0.11.0
0.20.0
0.20.0-preview.1
0.20.0-preview.2
0.20.0-preview.3
0.20.0-preview.4
0.20.0-preview.5
0.20.0-preview.6
0.20.0-preview.7
0.20.0-preview.8
0.20.0-rc.1
0.20.0-rc.1-1
0.20.0-rc.2
0.20.0-rc.3
0.20.1
0.20.2-rc.1
0.20.2-snapshot
0.20.2-snapshot.2
0.21.0-beta1
0.21.0-beta2
0.21.0-beta3
0.21.0-beta4
0.21.0-rc.1
0.9
0.9.1
0.9.2
0.9.3
0.9.4
0.9.4p1
0.9.5
0.9.5p1
0.9.6
0.9.6-PREVIEW
0.9.6-PREVIEW.2
0.9.6-PREVIEW.3
0.9.6-beta
0.9.7-preview.1

1.*

1.0.0
1.0.0-beta.1
1.0.0-beta.2
1.0.0-beta.3
1.0.0-rc.1
1.0.0-rc.2
1.0.0-rc.3
1.0.0-rc.4
1.0.1
1.1.0
1.1.0-beta.1
1.1.0-beta.2
1.1.0-beta.3
1.1.0-rc.1
1.1.0-rc.2
1.1.0-rc.3
1.1.1
1.1.2
1.2.0
1.2.0-rc.1
1.2.0-rc.2
1.2.0-rc.3
1.2.0-rc.4

2.*

2.0.0-alpha.1
2.0.0-alpha.2
2.0.0-alpha.3
2.0.0-alpha.4
2.0.0-alpha.5
2.0.0-beta.1
2.0.0-beta.2
2.0.0-beta.3
2.0.0-rc.1
2.1.0-alpha.1
2.1.0-alpha.2
2.1.0-beta.1
2.1.0-beta.2
2.1.0-beta.3
2.1.0-beta.4
2.1.0-rc.1
2.2.0
2.2.0-alpha.1
2.2.0-alpha.2
2.2.0-alpha.3
2.2.0-alpha.4
2.2.0-beta.1
2.2.0-beta.2
2.2.0-beta.3
2.2.0-beta.4
2.2.0-beta.5
2.2.0-beta.6
2.2.0-rc.1
2.3.0-alpha.1
2.3.0-alpha.2
2.3.0-alpha.3
2.3.0-beta.1
2.3.0-rc.1
2.4.0-alpha.1
2.4.0-alpha.2
2.4.0-alpha.3

3.*

3.0.0-alpha.0
3.0.0-alpha.1
3.0.0-alpha.2
3.0.0-alpha.3
3.0.0-alpha.4
3.0.0-alpha.5
3.0.0-beta.1
3.1.0
3.1.0-beta.1
3.1.0-beta.2
3.1.0-beta.3
3.1.0-rc.1
3.1.0-rc.2
3.2.0-beta.1
3.2.0-beta.2
3.2.0-beta.3
3.2.0-beta.4
3.2.0-rc.1
3.3.0
3.3.0-beta.1
3.3.0-beta.2
3.3.0-beta.3
3.3.0-rc.1
3.3.1
3.3.2

v0.*

v0.20.0-preview.1
v0.20.0-rc.1-1