CVE-2022-23942

7.5 HIGH

📋 TL;DR

CVE-2022-23942 is a vulnerability in Apache Doris where hardcoded cryptographic keys and initialization vectors (IVs) were used for encrypting LDAP passwords. This allows attackers to decrypt stored LDAP passwords, potentially leading to credential theft and unauthorized access. Organizations using Apache Doris versions before 1.0.0 with LDAP authentication enabled are affected.

💻 Affected Systems

Products:
  • Apache Doris
Versions: All versions prior to 1.0.0
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only affects systems with LDAP authentication enabled. Systems using other authentication methods are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers decrypt all LDAP passwords stored in the system, gain administrative access to the database, and potentially pivot to other systems using the same credentials.

🟠

Likely Case

Attackers with access to the encrypted password storage decrypt LDAP credentials and gain unauthorized access to the Apache Doris database.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the database instance itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the encrypted password storage. The hardcoded keys are publicly known, making decryption trivial once encrypted data is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.0 and later

Vendor Advisory: https://lists.apache.org/thread/com2dyzp3bn2rdrotry90q2zzord4tvt

Restart Required: Yes

Instructions:

1. Upgrade Apache Doris to version 1.0.0 or later. 2. Restart all Doris services. 3. If using LDAP, consider rotating LDAP passwords after upgrade.

🔧 Temporary Workarounds

Disable LDAP Authentication

all

Temporarily disable LDAP authentication until patching is complete

Modify fe.conf: enable_ldap_auth = false
Restart Doris FE service

Network Isolation

linux

Restrict network access to Doris instances

iptables -A INPUT -p tcp --dport 9030 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 9030 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can connect to Apache Doris instances
  • Monitor for unusual authentication attempts and review access logs regularly

🔍 How to Verify

Check if Vulnerable:

Check Apache Doris version: grep 'doris_version' /path/to/doris/logs/fe.log or check the web UI. If version is below 1.0.0 and LDAP is enabled, the system is vulnerable.

Check Version:

curl http://<doris_fe_host>:8030/api/health | grep version

Verify Fix Applied:

Verify version is 1.0.0 or higher and check that LDAP authentication still functions properly after upgrade.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed LDAP authentication attempts from unusual sources
  • Successful LDAP logins from unexpected IP addresses or users

Network Indicators:

  • Unusual traffic patterns to Doris ports (9030, 8030) from unauthorized sources

SIEM Query:

source="doris_fe.log" AND ("LDAP" AND ("failed" OR "success")) | stats count by src_ip, user

🔗 References

📤 Share & Export