CVE-2021-33900

7.5 HIGH

📋 TL;DR

Apache Directory Studio versions 2.0.0.v20210213-M16 and earlier fail to apply StartTLS encryption when using SASL authentication mechanisms (DIGEST-MD5, GSSAPI) and don't apply configured SASL confidentiality layers. This allows attackers to intercept and read sensitive authentication data and directory communications. Users of affected Apache Directory Studio versions are vulnerable.

💻 Affected Systems

Products:
  • Apache Directory Studio
Versions: 2.0.0.v20210213-M16 and all prior versions
Operating Systems: All platforms running Apache Directory Studio
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when using SASL authentication mechanisms (DIGEST-MD5, GSSAPI) with StartTLS or when SASL confidentiality layers are configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept unencrypted LDAP authentication credentials and directory data, leading to credential theft, data exposure, and potential lateral movement within the network.

🟠

Likely Case

Authentication credentials and directory queries/responses transmitted in cleartext, enabling credential harvesting and data interception.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential credential exposure without direct system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept communications between Directory Studio and LDAP server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.0.0.v20210213-M16

Vendor Advisory: https://lists.apache.org/thread.html/rb1dbcc43a5b406e45d335343a1704f4233de613140a01929d102fdc9%40%3Cusers.directory.apache.org%3E

Restart Required: Yes

Instructions:

1. Download latest Apache Directory Studio from official website
2. Uninstall old version
3. Install new version
4. Restart system

🔧 Temporary Workarounds

Disable SASL Authentication

all

Use simple authentication instead of SASL mechanisms to avoid the vulnerability

Configure LDAP connections to use simple bind instead of SASL DIGEST-MD5 or GSSAPI

Use LDAPS Instead of StartTLS

all

Configure connections to use LDAPS (LDAP over SSL) on port 636 instead of StartTLS

Change connection settings to use ldaps:// instead of ldap:// with port 636

🧯 If You Can't Patch

  • Isolate Directory Studio usage to trusted networks only
  • Implement network monitoring for cleartext LDAP traffic on port 389

🔍 How to Verify

Check if Vulnerable:

Check Help > About Apache Directory Studio for version number. If version is 2.0.0.v20210213-M16 or earlier, you are vulnerable.

Check Version:

In Directory Studio: Help > About Apache Directory Studio

Verify Fix Applied:

After updating, verify version is newer than 2.0.0.v20210213-M16 in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Cleartext LDAP authentication attempts
  • SASL authentication failures

Network Indicators:

  • Cleartext LDAP traffic on port 389 when SASL is configured
  • Missing TLS handshakes after SASL authentication

SIEM Query:

source_port:389 AND protocol:ldap AND NOT tls_handshake

🔗 References

📤 Share & Export