CVE-2023-28857
Java vulnerability analysis and mitigation

Overview

Apereo CAS, an open source multilingual single sign-on solution, contains a vulnerability (CVE-2023-28857) in its X509 certificate authentication functionality. When configured to use LDAP server for x509 authentication with a password, the system leaks LDAP credentials when processing certificate revocation lists (CRL). The vulnerability was discovered by Michael Stepankin from GitHub Security Lab and affects versions 6.5.x through 6.6.x, with a fix released in version 6.6.6 (GitHub Advisory, Apereo Advisory).

Technical details

The vulnerability occurs in the X509CredentialsAuthenticationHandler component when checking certificate revocation. When validating a client certificate, the handler fetches URLs provided in the 'CRL Distribution Points' extension of the certificate. If CAS is configured with LDAP authentication (using cas.authn.x509.ldap.ldap-url and cas.authn.x509.ldap.bind-credential properties), and the certificate contains LDAP URLs in its CRL distribution points, the system uses the same LDAP password for these CRL checks. The vulnerability can be exploited using even untrusted self-signed certificates, as the handler only checks date validity and revocation, but not the signature validity (GitHub Advisory).

Impact

An unauthenticated attacker can exploit this vulnerability to leak the password used for LDAP connection configured on the server. This could potentially lead to unauthorized access to the LDAP server and compromise of sensitive authentication data (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Apereo CAS version 6.6.6. Users running affected versions (6.5.x and 6.6.x) should upgrade to version 6.6.6 or later. For version 6.5.x, users should upgrade to version 6.5.9.1. There are no known workarounds for this vulnerability (Apereo Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14306CRITICAL10
  • JavaJava
  • net.sf.robocode:robocode.core
NoYesDec 09, 2025
CVE-2025-14307CRITICAL9.3
  • JavaJava
  • net.sf.robocode:robocode.battle
NoYesDec 09, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • at.yawk.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
GHSA-93fv-4pm9-xp28MEDIUM6.9
  • JavaJava
  • net.dv8tion:jda
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management