You are viewing a plain text version of this content. The canonical link for it is here.
Posted to server-dev@james.apache.org by "Thibaut SAUTEREAU (JIRA)" <se...@james.apache.org> on 2017/11/29 10:17:00 UTC

[jira] [Created] (JAMES-2243) Encode special characters in LDAP search filter to prevent injections

Thibaut SAUTEREAU created JAMES-2243:
----------------------------------------

             Summary: Encode special characters in LDAP search filter to prevent injections
                 Key: JAMES-2243
                 URL: https://issues.apache.org/jira/browse/JAMES-2243
             Project: James Server
          Issue Type: Bug
          Components: data, ldap
    Affects Versions: master
            Reporter: Thibaut SAUTEREAU


The user-controlled "name" input is not sanitized when making LDAP searches with searchAndBuildUser. This could lead to LDAP injections using special characters.

Possible scenario: an attacker can bruteforce password authentication without needing to target a specific user of test every user. For instance, instead of needing to test 1 M passwords on adupont@linagora.com and then on amartin@linagora.com, he can test on a*. Then if a password matches, he can quickly get to the user by dichotomy (aa*, ab*, aba*, abb*, etc.).



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscribe@james.apache.org
For additional commands, e-mail: server-dev-help@james.apache.org