Query inject attack / security vulnerability
valodzka opened this issue · 4 comments
Using simple python formatting for X-Ldap-Template and user input opens the door to ldap query injection attacks. For example:
X-Ldap-Template: (|(&(memberOf=x)(cn=%(username)s))(&(memberOf=y)(cn=%(username)s)))
Then passing username: x))((cn=username
bypass group check.
I reopening this because I don't think #93 was fixed and email security-alerts@nginx.org don't work
Hi @valodzka - Thanks for reaching out. I was the engineering working on the Blog post about the risk mitigation. We are aware of this issue and we are scheduling a new release of this reference implementation that will escape the username sent by the user.
The Mailbox should work I have just sent a test email from my external mailbox. If you have any further information / details feel free to share them directly with my t.stark[at]f5[dot]com.
Done - Closing the issue now