Submeter #769577: projectsend 35dfd6f08f7d517709c77ee73e57367141107e6b LDAP Injectioninformação

Títuloprojectsend 35dfd6f08f7d517709c77ee73e57367141107e6b LDAP Injection
DescriçãoThe ldap_email parameter is interpolated directly into an LDAP search filter without sanitization via ldap_escape(). An attacker can append wildcard characters to manipulate the filter, causing the server to return different error messages depending on whether a user exists in the LDAP directory — enabling email enumeration without any account.
Fonte⚠️ https://drive.google.com/file/d/1TNwWNTcra2ykx0yXpATPmsPgJxIxOrWb/view?usp=sharing
Utilizador
 0xNayel (UID 80926)
Submissão28/02/2026 10h59 (há 2 meses)
Moderação12/03/2026 10h08 (12 days later)
EstadoAceite
Entrada VulDB350657 [projectsend até r1945 Auth.php ldap_email Divulgação de Informação]
Pontos19

Interested in the pricing of exploits?

See the underground prices here!