{"api_version":"1","generated_at":"2026-04-22T22:49:42+00:00","cve":"CVE-2023-33201","urls":{"html":"https://cve.report/CVE-2023-33201","api":"https://cve.report/api/cve/CVE-2023-33201.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-33201","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-33201"},"summary":{"title":"CVE-2023-33201","description":"Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-07-05 03:15:00","updated_at":"2023-08-24 19:15:00"},"problem_types":["CWE-295"],"metrics":[],"references":[{"url":"https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc","name":"https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc","refsource":"CONFIRM","tags":[],"title":"added filter encode to search · bcgit/bc-java@e8c409a · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html","name":"[debian-lts-announce] 20230802 [SECURITY] [DLA 3514-1] bouncycastle security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3514-1] bouncycastle security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bouncycastle.org","name":"https://bouncycastle.org","refsource":"MISC","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/bcgit/bc-java/wiki/CVE-2023-33201","name":"https://github.com/bcgit/bc-java/wiki/CVE-2023-33201","refsource":"MISC","tags":[],"title":"CVE 2023 33201 · bcgit/bc-java Wiki · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20230824-0008/","name":"https://security.netapp.com/advisory/ntap-20230824-0008/","refsource":"CONFIRM","tags":[],"title":"CVE-2023-33201 Bouncy Castle Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-33201","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33201","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"33201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bouncycastle","cpe5":"bc-java","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-33201","qid":"242105","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 9 (RHSA-2023:5486)"},{"cve":"CVE-2023-33201","qid":"242106","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 7 (RHSA-2023:5484)"},{"cve":"CVE-2023-33201","qid":"242122","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 8 (RHSA-2023:5485)"},{"cve":"CVE-2023-33201","qid":"355812","title":"Amazon Linux Security Advisory for bouncycastle : ALAS2023-2023-280"},{"cve":"CVE-2023-33201","qid":"6000123","title":"Debian Security Update for bouncycastle (DLA 3514-1)"},{"cve":"CVE-2023-33201","qid":"754178","title":"SUSE Enterprise Linux Security Update for bouncycastle (SUSE-SU-2023:2843-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-33201","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://bouncycastle.org","refsource":"MISC","name":"https://bouncycastle.org"},{"refsource":"CONFIRM","name":"https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc","url":"https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc"},{"refsource":"MISC","name":"https://github.com/bcgit/bc-java/wiki/CVE-2023-33201","url":"https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230802 [SECURITY] [DLA 3514-1] bouncycastle security update","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20230824-0008/","url":"https://security.netapp.com/advisory/ntap-20230824-0008/"}]}},"nvd":{"publishedDate":"2023-07-05 03:15:00","lastModifiedDate":"2023-08-24 19:15:00","problem_types":["CWE-295"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*","versionEndExcluding":"1.74","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}