Skip to content

LDAP User Authentication with Complicated Password #7344

@penfold1972

Description

@penfold1972

/!\ To report a security issue please follow this procedure:
[https://github.com/OpenNebula/one/wiki/Vulnerability-Management-Process]

Description
While testing LDAP user authentication, a user with a password that contains a component that can be URI encoded globbers the password being submitted to LDAP.

To Reproduce
Create a user in LDAP with "Pass%22word" and then try to login as that user in fireedge/sunstone. The password gets encoded to "Pass@word" during the LDAP BIND as that user. However, if you type "Pass%2522word" into the web interface, it gets encoded to the correct password "Pass%22word" and succeeds.

Expected behavior
The expected behavior is for the characters a user enters into the password field to be processed in such a way that they are submitted to LDAP as entered verbatim. I would also expect the input to be processed/escaped to avoid the normal hacks (e.g. SQL injection, etc)

Details

  • Affected Component: [ Sunstone / FireEdge ]
  • Hypervisor: KVM
  • Version: 7.0.0

Additional context
Add any other context about the problem here.

Progress Status

  • Code committed
  • Testing - QA
  • Documentation (Release notes - resolved issues, compatibility, known issues)

Metadata

Metadata

Assignees

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions