#458 SSSD needs to sanitize LDAP attribute options
Closed: Fixed None Opened 14 years ago by sgallagh.

While there is at present no security risk, it was noted in https://bugzilla.redhat.com/show_bug.cgi?id=587743 that it is possible to perform an "LDAP injection" to the attribute options (such as

ldap_user_object_class = posixAccount)(Host=la1.prd.core.mgmt.shell.linux

We should probably guarantee that no parentheses appear in these options.


Fields changed

milestone: NEEDS_TRIAGE => SSSD 1.3

Fields changed

milestone: SSSD 1.4.0 => SSSD Deferred
owner: simo => sgallagh
priority: major => trivial

Fields changed

milestone: SSSD Deferred => SSSD 1.5.0

Fields changed

priority: trivial => major

Fields changed

status: new => assigned

Fixed by be43462

fixedin: => 1.5.0
resolution: => fixed
status: assigned => closed

Metadata Update from @sgallagh:
- Issue assigned to sgallagh
- Issue set to the milestone: SSSD 1.5.0

7 years ago

SSSD is moving from Pagure to Github. This means that new issues and pull requests
will be accepted only in SSSD's github repository.

This issue has been cloned to Github and is available here:
- https://github.com/SSSD/sssd/issues/1500

If you want to receive further updates on the issue, please navigate to the github issue
and click on subscribe button.

Thank you for understanding. We apologize for all inconvenience.

Login to comment on this ticket.

Metadata