-
Notifications
You must be signed in to change notification settings - Fork 520
Description
/!\ To report a security issue please follow this procedure:
[https://github.com/OpenNebula/one/wiki/Vulnerability-Management-Process]
Description
While testing LDAP user authentication, a user with a password that contains a component that can be URI encoded globbers the password being submitted to LDAP.
To Reproduce
Create a user in LDAP with "Pass%22word" and then try to login as that user in fireedge/sunstone. The password gets encoded to "Pass@word" during the LDAP BIND as that user. However, if you type "Pass%2522word" into the web interface, it gets encoded to the correct password "Pass%22word" and succeeds.
Expected behavior
The expected behavior is for the characters a user enters into the password field to be processed in such a way that they are submitted to LDAP as entered verbatim. I would also expect the input to be processed/escaped to avoid the normal hacks (e.g. SQL injection, etc)
Details
- Affected Component: [ Sunstone / FireEdge ]
- Hypervisor: KVM
- Version: 7.0.0
Additional context
Add any other context about the problem here.
Progress Status
- Code committed
- Testing - QA
- Documentation (Release notes - resolved issues, compatibility, known issues)