Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-27860

Опубликовано: 27 мар. 2026
Источник: redhat
CVSS3: 3.7

Описание

If auth_username_chars is empty, it is possible to inject arbitrary LDAP filter to Dovecot's LDAP authentication. This leads to potentially bypassing restrictions and allows probing of LDAP structure. Do not clear out auth_username_chars, or install fixed version. No publicly available exploits are known.

A flaw was found in Dovecot. A remote attacker could exploit this vulnerability by injecting malicious Lightweight Directory Access Protocol (LDAP) filters during the authentication process. This is possible if the auth_username_chars configuration setting is empty. Successful exploitation could allow the attacker to bypass authentication restrictions and gain unauthorized access to information about the LDAP directory structure.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10dovecotFix deferred
Red Hat Enterprise Linux 6dovecotOut of support scope
Red Hat Enterprise Linux 7dovecotFix deferred
Red Hat Enterprise Linux 8dovecotFix deferred
Red Hat Enterprise Linux 9dovecotFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-90
https://bugzilla.redhat.com/show_bug.cgi?id=2452176dovecot: Dovecot: Authentication bypass and information disclosure via LDAP filter injection

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
nvd
5 дней назад

If auth_username_chars is empty, it is possible to inject arbitrary LDAP filter to Dovecot's LDAP authentication. This leads to potentially bypassing restrictions and allows probing of LDAP structure. Do not clear out auth_username_chars, or install fixed version. No publicly available exploits are known.

CVSS3: 3.7
debian
5 дней назад

If auth_username_chars is empty, it is possible to inject arbitrary LD ...

CVSS3: 3.7
github
5 дней назад

If auth_username_chars is empty, it is possible to inject arbitrary LDAP filter to Dovecot's LDAP authentication. This leads to potentially bypassing restrictions and allows probing of LDAP structure. Do not clear out auth_username_chars, or install fixed version. No publicly available exploits are known.

3.7 Low

CVSS3