Vulnerability Description
The userLogin parameter in ldap/login.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a LDAP injection and obtain sensitive information via a crafted POST request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rconfig | Rconfig | 3.9.5 |
Related Weaknesses (CWE)
References
- https://cwe.mitre.org/data/definitions/90.htmlThird Party Advisory
- https://github.com/rconfig/rconfig/blob/7ef8bd8d606bc10835e1b8f6f72a2048094816d3ExploitThird Party Advisory
- https://cwe.mitre.org/data/definitions/90.htmlThird Party Advisory
- https://github.com/rconfig/rconfig/blob/7ef8bd8d606bc10835e1b8f6f72a2048094816d3ExploitThird Party Advisory
FAQ
What is CVE-2020-23148?
CVE-2020-23148 is a vulnerability with a CVSS score of 7.5 (HIGH). The userLogin parameter in ldap/login.php of rConfig 3.9.5 is unsanitized, allowing attackers to perform a LDAP injection and obtain sensitive information via a crafted POST request.
How severe is CVE-2020-23148?
CVE-2020-23148 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-23148?
Check the references section above for vendor advisories and patch information. Affected products include: Rconfig Rconfig.