The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: OX
Published: 2024-01-08T08:51:40.489Z
Updated: 2024-08-26T18:42:52.971Z
Reserved: 2023-03-30T09:34:25.189Z
Link: CVE-2023-29050
Vulnrichment
Updated: 2024-08-02T14:00:15.126Z
NVD
Status : Modified
Published: 2024-01-08T09:15:20.300
Modified: 2024-11-21T07:56:27.090
Link: CVE-2023-29050
Redhat
No data.