CVE-2021-37933

An LDAP injection vulnerability in /account/login in Huntflow Enterprise before 3.10.6 could allow an unauthenticated, remote user to modify the logic of an LDAP query and bypass authentication. The vulnerability is due to insufficient server-side validation of the email parameter before using it to construct LDAP queries. An attacker could bypass authentication exploiting this vulnerability by sending login attempts in which there is a valid password but a wildcard character in email parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:huntflow:huntflow_enterprise:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:16

Type Values Removed Values Added
References () https://gist.github.com/andrey-lomtev/cbf12bc8d8763996cf8d6d1641a0b049 - Exploit, Third Party Advisory () https://gist.github.com/andrey-lomtev/cbf12bc8d8763996cf8d6d1641a0b049 - Exploit, Third Party Advisory

Information

Published : 2021-10-14 16:15

Updated : 2024-11-21 06:16


NVD link : CVE-2021-37933

Mitre link : CVE-2021-37933

CVE.ORG link : CVE-2021-37933


JSON object : View

Products Affected

huntflow

  • huntflow_enterprise
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')