<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Netflix — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/netflix/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 08 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/netflix/feed.xml" rel="self" type="application/rss+xml"/><item><title>Lemur LDAP Filter Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-lemur-ldap-injection/</link><pubDate>Mon, 08 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lemur-ldap-injection/</guid><description>Lemur versions before 1.9.0 are vulnerable to LDAP filter injection, where an authenticated LDAP user can inject LDAP filter metacharacters through the username field to manipulate group membership queries and escalate their privileges to administrator.</description><content:encoded><![CDATA[<p>Lemur, a certificate management tool, is vulnerable to LDAP filter injection in versions prior to 1.9.0. The vulnerability resides within the <code>lemur/auth/ldap.py</code> module, where user-supplied input from the username field is used to construct LDAP search filters without proper sanitization. Specifically, the <code>_bind()</code> method uses Python string interpolation to build LDAP queries based on the provided username. This allows an authenticated LDAP user to inject LDAP filter metacharacters, manipulating group membership queries and potentially escalating their privileges to administrator. Successful exploitation grants unauthorized access to certificates, private keys, and CA configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Lemur instance with LDAP authentication enabled.</li>
<li>Attacker obtains valid LDAP credentials for a low-privilege user.</li>
<li>The attacker crafts a malicious username containing LDAP filter metacharacters, such as <code>)(memberOf=CN=LemurAdmins,DC=corp,DC=example,DC=com</code>.</li>
<li>The attacker sends a <code>POST /auth/login</code> request with the crafted username and valid password.</li>
<li>Lemur&rsquo;s <code>ldap.py</code> module constructs an LDAP filter using the unsanitized username, resulting in a modified query.</li>
<li>The LDAP server processes the malicious filter, potentially returning unintended group memberships.</li>
<li>Lemur assigns the user the <code>admin</code> role based on the manipulated LDAP query results.</li>
<li>The attacker gains unauthorized access to sensitive resources, including certificates, private keys, and CA configurations, and can issue certificates under any authority.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain administrative privileges within Lemur, potentially compromising all managed certificates and associated private keys. The attacker can then issue certificates under any authority, leading to a complete compromise of trust within the affected organization. While the exact number of affected Lemur instances is unknown, this vulnerability poses a significant risk to organizations relying on Lemur for certificate management, particularly those in highly regulated sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Lemur to version 1.9.0 or later to patch the LDAP injection vulnerability (CVE-2026-44304).</li>
<li>Deploy the provided Sigma rule to detect suspicious process creations with arguments indicative of exploitation attempts.</li>
<li>Enable webserver logging to monitor for unusual characters in usernames submitted via POST requests to <code>/auth/login</code> to proactively identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ldap</category><category>injection</category><category>privilege-escalation</category></item></channel></rss>