•  
      request #24168 Indirect LDAP injection via the ldap_id attribute of a user when checking if it exists
    Infos
    #24168
    Thomas Gerbet (tgerbet)
    2021-12-15 08:42
    2021-11-23 15:14
    25619
    Details
    Indirect LDAP injection via the ldap_id attribute of a user when checking if it exists

    Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization when checking it the user still exist. This issue is related to request #24149, the initial fix was incomplete.

    Impact

    A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account.
    CVSSv3.1 score: 6.7 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L)

    References

    CWE 90
    OWASP LDAP Injection
    CVE-2021-43782

    Authentication & LDAP
    Empty
    Empty
    • [ ] enhancement
    • [ ] internal improvement
    Empty
    Stage
    Thomas Gerbet (tgerbet)
    Closed
    2021-11-25
    Attachments
    Empty
    References

    Follow-ups

    User avatar
    Thomas Gerbet (tgerbet)2021-11-29 09:10

    CVE-2021-43782 has been assigned to this issue.


    • Original Submission
      Something went wrong, the follow up content couldn't be loaded
      Only formatting have been changed, you should switch to markup to see the changes
    User avatar

    integrated to Tuleap 13.2.99.83


    • Status changed from Under review to Closed
    • Connected artifacts
    • Close date set to 2021-11-25
    User avatar
    Thomas Gerbet (tgerbet)2021-11-23 15:16

    Patch under review: gerrit #24533.


    • Summary
      -request #24149: Indirect LDAP injection via the ldap_id attribute of a user when checking if it exist 
      +Indirect LDAP injection via the ldap_id attribute of a user when checking if it exists 
    • Status changed from Under implementation to Under review