The optional "LDAP contacts provider" could be abused by...
High severity
Unreviewed
Published
Jan 8, 2024
to the GitHub Advisory Database
•
Updated Jan 12, 2024
Description
Published by the National Vulnerability Database
Jan 8, 2024
Published to the GitHub Advisory Database
Jan 8, 2024
Last updated
Jan 12, 2024
The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
References