CVE-2023-29050

Published Jan 8, 2024

Last updated 10 months ago

Overview

Description
The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
Source
security@open-xchange.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.6
Impact score
5.8
Exploitability score
3.1
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
Severity
CRITICAL

Weaknesses

nvd@nist.gov
CWE-74
security@open-xchange.com
CWE-90

Social media

Hype score
Not currently trending

Configurations