LDAP Injection at ██████

Disclosed: 2019-12-02 19:05:49 By tampe125 To deptofdefense
Medium
Vulnerability Details
**Summary:** An LDAP Injection has been found at the mentioned domain **Description:** While performing a user registration, is it possible to edit the request and inject invalid characters, resulting in a LDAP injection ## Step-by-step Reproduction Instructions 1. Visit page https://█████████/Registration/Home/New 2. Start a new registration process with "regular" data 3. The request is correctly processes 4. Start a new registration process and use a double quote as first name 5. You will get a fatal error Attached you can find the rogue request and the screenshot of the fatal error. Error `0x80005000` is specific of LDAP, this means that the application is trying to handle user data without sanitizing it ## Suggested Mitigation/Remediation Actions Application should sanitize **all** user input before trying to store it in any way. ## Impact Attacker could enumerate current domain or exfiltrate data. On more practical terms, since user should be manually validated, attacker could bypass such activation. That's a serious threat, because all requests must be approved and verified by other US Officers.
Actions
View on HackerOne
Report Stats
  • Report ID: 359290
  • State: Closed
  • Substate: resolved
  • Upvotes: 6
Share this report