VYPR
Moderate severityOSV Advisory· Published Jun 19, 2020· Updated Aug 4, 2024

CVE-2020-9495

CVE-2020-9495

Description

Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Archiva before 2.2.5 is vulnerable to LDAP injection via the login form, allowing attackers to retrieve arbitrary LDAP user attributes by timing responses.

Vulnerability

Analysis

CVE-2020-9495 is an LDAP injection vulnerability in the Apache Archiva login service, affecting all versions before 2.2.5 [1][2]. The root cause lies in insufficient sanitization of user-supplied input during LDAP authentication. By crafting special characters (such as LDAP filter wildcards or logical operators) in the login form, an attacker can manipulate the LDAP query used to look up user objects in the connected directory server [3].

Exploitation

Method

The attacker does not need prior authentication but must have network access to an Archiva instance configured with LDAP authentication. The exploitation technique relies on timing-based inference: by injecting characters that modify the LDAP filter and observing the response time of login requests, an attacker can guess the value of arbitrary attributes of LDAP user objects [3]. For example, injecting conditions that cause the LDAP search to return or not return results will lead to measurable differences in response latency.

Impact

Successful exploitation allows an attacker to extract sensitive attribute data from LDAP user objects—such as email addresses, group memberships, or other directory information—without legitimate credentials [1][3]. This information leakage could aid further targeted attacks, such as privilege escalation or social engineering. The vulnerability does not directly allow authentication bypass or remote code execution.

Mitigation

The issue is fixed in Apache Archiva 2.2.5 [1][2]. Users are strongly advised to upgrade to this version or later. There are no known workarounds, and the vulnerability is only present when LDAP authentication is enabled. The Apache Software Foundation has not reported active exploitation in the wild as of the publication date.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.archiva:archivaMaven
< 2.2.52.2.5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.