A SQL injection vulnerability was discovered in ADSelfService Plus when password synchronization was enabled for Oracle Database. This issue has now been fixed.
During account linking between Active Directory and Oracle Database for password synchronization, the usernames provided were added into SQL queries without sanitization. These were then sent to the linked Oracle Database, making the application vulnerable to Boolean-based SQL injection attacks. If the injection attacks become successful, there is a risk of data from ADSelfService Plus being exposed.
ADSelfService Plus builds 6101 and below are affected by this.
This issue has been rated medium in severity.
We have fixed this vulnerability in build 6112 of ADSSP. Update to the latest version of ADSelfService Plus using the service pack.
This issue was reported by STM Cyber via BugBounty.
Need further assistance? Fill this form, and we'll contact you rightaway.
Allow Active Directory users to self-service their password resets and account unlock tasks, freeing them from lengthy help desk calls.
Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications using their Active Directory credentials.
Intimate Active Directory users of their impending password and account expiry via email and SMS notifications.
Synchronize Windows Active Directory user passwords and account changes across multiple systems automatically, including Microsoft 365, Google Workspace, IBM iSeries, and more.
Strong passwords resist various hacking threats. Enforce Active Directory users to adhere to compliant passwords by displaying password complexity requirements.
Enable Active Directory users to update their latest information themselves. Quick search features help admins scout for information using search keys like contact numbers.