The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32654 | The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-08-26T18:42:52.971Z
Reserved: 2023-03-30T09:34:25.189Z
Link: CVE-2023-29050
Updated: 2024-08-02T14:00:15.126Z
Status : Modified
Published: 2024-01-08T09:15:20.300
Modified: 2024-11-21T07:56:27.090
Link: CVE-2023-29050
No data.
OpenCVE Enrichment
No data.
EUVD