CVE-2020-9495
Description
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Archiva before 2.2.5 is vulnerable to LDAP injection via the login form, allowing attackers to retrieve arbitrary LDAP user attributes by timing responses.
Vulnerability
Analysis
CVE-2020-9495 is an LDAP injection vulnerability in the Apache Archiva login service, affecting all versions before 2.2.5 [1][2]. The root cause lies in insufficient sanitization of user-supplied input during LDAP authentication. By crafting special characters (such as LDAP filter wildcards or logical operators) in the login form, an attacker can manipulate the LDAP query used to look up user objects in the connected directory server [3].
Exploitation
Method
The attacker does not need prior authentication but must have network access to an Archiva instance configured with LDAP authentication. The exploitation technique relies on timing-based inference: by injecting characters that modify the LDAP filter and observing the response time of login requests, an attacker can guess the value of arbitrary attributes of LDAP user objects [3]. For example, injecting conditions that cause the LDAP search to return or not return results will lead to measurable differences in response latency.
Impact
Successful exploitation allows an attacker to extract sensitive attribute data from LDAP user objects—such as email addresses, group memberships, or other directory information—without legitimate credentials [1][3]. This information leakage could aid further targeted attacks, such as privilege escalation or social engineering. The vulnerability does not directly allow authentication bypass or remote code execution.
Mitigation
The issue is fixed in Apache Archiva 2.2.5 [1][2]. Users are strongly advised to upgrade to this version or later. There are no known workarounds, and the vulnerability is only present when LDAP authentication is enabled. The Apache Software Foundation has not reported active exploitation in the wild as of the publication date.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.archiva:archivaMaven | < 2.2.5 | 2.2.5 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- github.com/advisories/GHSA-v83p-xwm9-v4g8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-9495ghsaADVISORY
- archiva.apache.org/security.htmlghsax_refsource_MISCWEB
- www.openwall.com/lists/oss-security/2020/06/19/1ghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cannounce.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cdev.archiva.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d%40%3Cusers.archiva.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cdev.archiva.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cusers.archiva.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d%40%3Cusers.maven.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d@%3Cusers.maven.apache.org%3EghsaWEB
News mentions
0No linked articles in our index yet.