First published: Tue Sep 26 2023(Updated: )
The Staff / Employee Business Directory for Active Directory plugin for WordPress is vulnerable to LDAP Passback in versions up to, and including, 1.2.3. This is due to insufficient validation when changing the LDAP server. This makes it possible for authenticated attackers, with administrative access and above, to change the LDAP server and retrieve the credentials for the original LDAP server.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Miniorange Staff / Employee Business Directory For Active Directory | <1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4505 is a vulnerability in the Staff / Employee Business Directory for Active Directory plugin for WordPress that allows authenticated attackers with administrative access to perform LDAP Passback.
CVE-2023-4505 has a severity value of 4.9, which is classified as medium.
CVE-2023-4505 affects versions up to, and including, 1.2.3 of the Staff / Employee Business Directory for Active Directory plugin for WordPress.
LDAP Passback is a method used by the vulnerable plugin to change the LDAP server without proper validation, allowing attackers to exploit the vulnerability.
To fix CVE-2023-4505, update the Staff / Employee Business Directory for Active Directory plugin for WordPress to a version above 1.2.3.