Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3jqf-v4mv-747g

Опубликовано: 22 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 2.7

Описание

Moonraker affected by LDAP search filter injection

Impact

Instances of Moonraker configured with the ldap component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes.

Patches

Users should upgrade to Moonraker 0.10.0 which patches this vulnerability.

Workarounds

Admins can set the max_login_attempts option in the [authorization] section to a reasonable value. Any IP attempting to exploit this vulnerability will be locked out after it has reached the specified number of consecutive failed login attempts. This condition is cleared after a Moonraker restart. Note that if an attacker knows a valid user password they can bypass this protection by successfully logging in.

The most secure workaround for users unable to upgrade is to remove the ldap section from moonraker.conf and rely on the built in user authentication.

Пакеты

Наименование

moonraker

pip
Затронутые версииВерсия исправления

< 0.10.0

0.10.0

EPSS

Процентиль: 19%
0.00062
Низкий

2.7 Low

CVSS4

Дефекты

CWE-90

Связанные уязвимости

nvd
15 дней назад

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

EPSS

Процентиль: 19%
0.00062
Низкий

2.7 Low

CVSS4

Дефекты

CWE-90