CVE-2019-25095: LdapCherry Cross-site Scripting vulnerbaility
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21933%
CWE
Published
1/5/2023
Updated
9/27/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ldapcherry | pip | < 1.0.0 | 1.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key patterns: 1) Use of base64 encoding (instead of URL-safe encoding) for user-controlled redirect URLs in _check_auth, which bypassed proper escaping. 2) Direct use of decoded URL parameters in login redirection without sanitization. The commit diff shows replacement of base64 with urllib.quote_plus and template escaping improvements, confirming these functions were the injection points. The templates' ${form} and ${roles} variables also lacked HTML escaping filters before the patch, but these are template-level issues rather than discrete functions.