Search for vulnerabilities
Vulnerability details: VCID-f8vc-nspc-qyfj
Vulnerability ID VCID-f8vc-nspc-qyfj
Aliases CVE-2023-33201
GHSA-hr8g-6v94-x4m9
Summary Bouncy Castle For Java LDAP injection vulnerability Bouncy Castle provides the `X509LDAPCertStoreSpi.java` class which can be used in conjunction with the CertPath API for validating certificate paths. Pre-1.73 the implementation did not check the X.500 name of any certificate, subject, or issuer being passed in for LDAP wild cards, meaning the presence of a wild car may lead to Information Disclosure. A potential attack would be to generate a self-signed certificate with a subject name that contains special characters, e.g: `CN=Subject*)(objectclass=`. This will be included into the filter and provides the attacker ability to specify additional attributes in the search query. This can be exploited as a blind LDAP injection: an attacker can enumerate valid attribute values using the boolean blind injection technique. The exploitation depends on the structure of the target LDAP directory, as well as what kind of errors are exposed to the user. Changes to the `X509LDAPCertStoreSpi.java` class add the additional checking of any X.500 name used to correctly escape wild card characters.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33201.json
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
epss 0.00289 https://api.first.org/data/v1/epss?cve=CVE-2023-33201
cvssv3.1 5.3 https://bouncycastle.org
generic_textual MODERATE https://bouncycastle.org
ssvc Track https://bouncycastle.org
cvssv3.1 5.3 https://bouncycastle.org/releasenotes.html#r1rv74
generic_textual MODERATE https://bouncycastle.org/releasenotes.html#r1rv74
cvssv3.1 8.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-hr8g-6v94-x4m9
cvssv3.1 5.3 https://github.com/bcgit/bc-java
generic_textual MODERATE https://github.com/bcgit/bc-java
cvssv3.1 5.3 https://github.com/bcgit/bc-java/commit/ccf93ca736b89250ff4ce079a5aa56f5cbf0ebbd
generic_textual MODERATE https://github.com/bcgit/bc-java/commit/ccf93ca736b89250ff4ce079a5aa56f5cbf0ebbd
cvssv3.1 5.3 https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc
generic_textual MODERATE https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc
ssvc Track https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc
cvssv3.1 5.3 https://github.com/bcgit/bc-java/commits/main/prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java
generic_textual MODERATE https://github.com/bcgit/bc-java/commits/main/prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java
cvssv3.1 5.3 https://github.com/bcgit/bc-java/wiki/CVE-2023-33201
generic_textual MODERATE https://github.com/bcgit/bc-java/wiki/CVE-2023-33201
ssvc Track https://github.com/bcgit/bc-java/wiki/CVE-2023-33201
cvssv3.1 5.3 https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html
ssvc Track https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-33201
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2023-33201
cvssv3.1 5.3 https://security.netapp.com/advisory/ntap-20230824-0008
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20230824-0008
ssvc Track https://security.netapp.com/advisory/ntap-20230824-0008/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33201.json
https://api.first.org/data/v1/epss?cve=CVE-2023-33201
https://bouncycastle.org
https://bouncycastle.org/releasenotes.html#r1rv74
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33201
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/bcgit/bc-java
https://github.com/bcgit/bc-java/commit/ccf93ca736b89250ff4ce079a5aa56f5cbf0ebbd
https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc
https://github.com/bcgit/bc-java/commits/main/prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java
https://github.com/bcgit/bc-java/wiki/CVE-2023-33201
https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2023-33201
https://security.netapp.com/advisory/ntap-20230824-0008
https://security.netapp.com/advisory/ntap-20230824-0008/
1040050 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040050
2215465 https://bugzilla.redhat.com/show_bug.cgi?id=2215465
cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*
GHSA-hr8g-6v94-x4m9 https://github.com/advisories/GHSA-hr8g-6v94-x4m9
RHSA-2023:5147 https://access.redhat.com/errata/RHSA-2023:5147
RHSA-2023:5165 https://access.redhat.com/errata/RHSA-2023:5165
RHSA-2023:7482 https://access.redhat.com/errata/RHSA-2023:7482
RHSA-2023:7483 https://access.redhat.com/errata/RHSA-2023:7483
RHSA-2023:7484 https://access.redhat.com/errata/RHSA-2023:7484
RHSA-2023:7486 https://access.redhat.com/errata/RHSA-2023:7486
RHSA-2023:7488 https://access.redhat.com/errata/RHSA-2023:7488
RHSA-2023:7669 https://access.redhat.com/errata/RHSA-2023:7669
RHSA-2023:7678 https://access.redhat.com/errata/RHSA-2023:7678
RHSA-2024:0278 https://access.redhat.com/errata/RHSA-2024:0278
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33201.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://bouncycastle.org
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T15:47:56Z/ Found at https://bouncycastle.org
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://bouncycastle.org/releasenotes.html#r1rv74
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/bcgit/bc-java
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/bcgit/bc-java/commit/ccf93ca736b89250ff4ce079a5aa56f5cbf0ebbd
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T15:47:56Z/ Found at https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/bcgit/bc-java/commits/main/prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/bcgit/bc-java/wiki/CVE-2023-33201
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T15:47:56Z/ Found at https://github.com/bcgit/bc-java/wiki/CVE-2023-33201
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T15:47:56Z/ Found at https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-33201
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20230824-0008
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T15:47:56Z/ Found at https://security.netapp.com/advisory/ntap-20230824-0008/
Exploit Prediction Scoring System (EPSS)
Percentile 0.51993
EPSS Score 0.00289
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:44:37.218367+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-hr8g-6v94-x4m9/GHSA-hr8g-6v94-x4m9.json 37.0.0