The Staff / Employee Business Directory for Active Directory plugin for WordPress is vulnerable to LDAP Passback in versions up to, and including, 1.2.3. This is due to insufficient validation when changing the LDAP server. This makes it possible for authenticated attackers, with administrative access and above, to change the LDAP server and retrieve the credentials for the original LDAP server.
References
Link | Resource |
---|---|
https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313 | Exploit Third Party Advisory |
https://wordpress.org/plugins/ldap-ad-staff-employee-directory-search/ | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/1ea40b96-4693-4f98-8e6e-2ed8186cedd8?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-09-26T01:51:13.836Z
Updated: 2023-09-26T01:51:13.836Z
Reserved: 2023-08-23T21:43:23.252Z
Link: CVE-2023-4505
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-27T15:19:40.627
Modified: 2023-11-07T04:22:40.563
Link: CVE-2023-4505
JSON object: View
Redhat Information
No data.
CWE
No CWE.