First published: Mon Aug 09 2021(Updated: )
The userLogin parameter in ldap/login.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a LDAP injection and obtain sensitive information via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-23148 refers to a vulnerability in rConfig 3.9.5 that allows attackers to perform LDAP injection and obtain sensitive information.
CVE-2020-23148 has a severity rating of high (7.5).
An attacker can exploit CVE-2020-23148 by sending a crafted POST request to ldap/login.php with a malicious userLogin parameter.
rConfig version 3.9.5 is affected by CVE-2020-23148.
To mitigate CVE-2020-23148, update rConfig to a version that addresses the vulnerability and sanitize input parameters in ldap/login.php.