VYPR
High severityNVD Advisory· Published Nov 2, 2021· Updated Aug 4, 2024

Improper Neutralization of Special Elements used in an LDAP Query

CVE-2021-41232

Description

Thunderdome is an open source agile planning poker tool in the theme of Battling for points. In affected versions there is an LDAP injection vulnerability which affects instances with LDAP authentication enabled. The provided username is not properly escaped. This issue has been patched in version 1.16.3. If users are unable to update they should disable the LDAP feature if in use.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/stevenweathers/thunderdome-planning-pokerGo
< 1.16.31.16.3

Affected products

1

Patches

1
f1524d01e8a0

Fix LDAP vulnerability

1 file changed · +1 1
  • auth.go+1 1 modified
    @@ -68,7 +68,7 @@ func (s *server) authAndCreateUserLdap(UserName string, UserPassword string) (*d
     
     	searchRequest := ldap.NewSearchRequest(viper.GetString("auth.ldap.basedn"),
     		ldap.ScopeWholeSubtree, ldap.NeverDerefAliases, 0, 0, false,
    -		fmt.Sprintf(viper.GetString("auth.ldap.filter"), UserName),
    +		fmt.Sprintf(viper.GetString("auth.ldap.filter"), ldap.EscapeFilter(UserName)),
     		[]string{"dn", viper.GetString("auth.ldap.mail_attr"), viper.GetString("auth.ldap.cn_attr")},
     		nil,
     	)
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.