Bug 2403228 (CVE-2025-61911)
| Summary: | CVE-2025-61911 python-ldap: sanitization bypass in ldap.filter.escape_filter_chars | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | anthomas, bdettelb, doconnor, eglynn, ehelms, ggainey, haoli, hkataria, jajackso, jcammara, jjoyce, jmitchel, jneedle, jschluet, juwatts, kegrant, koliveir, kshier, lhh, lsvaty, mabashia, mburns, mgarciac, mhulan, nmoumoul, osousa, pbraun, pcreech, pgrist, rchan, shvarugh, simaishi, smallamp, smcdonal, stcannon, teagle, tfister, thavo, tmalecek, yguenane |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A sanitization bypass vulnerability has been discovered in python-ldap’s ldap.filter.escape_filter_chars method. When a crafted list or dict object is supplied as the assertion_value parameter with escape_mode=1, the method may skip escaping special characters. This can allow an attacker to inject unescaped special characters into LDAP filters, leading to possible LDAP injection attacks which could disclose or manipulate data.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2406983, 2406984, 2406985, 2406986, 2406987, 2406988, 2406990 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2025-10-10 23:01:52 UTC
|