-
Notifications
You must be signed in to change notification settings - Fork 13.2k
Closed
Description
Description:
Since upgrading to version 4.0.0, we noticed that login with ldap users was successfull even with a wrong password.
Steps to reproduce:
- Update rocket-ce from 3.8.12 towards 4.0.0 and update mongodb from 4.0.x to 4.2.x (tested with 4.4 and 5.0 as well)
- Go to rocket login page, type in any ldap user with random password
- You realized that what ever the password you input, you still gain access to the account
Expected behavior:
Check password and refuse connection if the password does not correspond to ldap.
Actual behavior:
User get logged in as long as they exist in ldap... enven tho the user password is wrong.
Server Setup Information:
- Version of Rocket.Chat Server:
- Operating System: Debian Buster
- Deployment Method: tar
- Number of Running Instances: 1
- DB Replicaset Oplog: Wiredtiger
- NodeJS Version: 12.22.1
- MongoDB Version: 4.2.15
Client Setup Information
- Desktop App or Browser Version: any
- Operating System: any
This is pretty critical IMHO and we should not be an isolated case. For now our service is down as personal information could be accessed by any peer. (We'll use a backup in last resort scenario)
If any more information is needed, please feel free to ask. From what we've seen, logs do not verbose any strange behavior.
Thanks in advance,
Reactions are currently unavailable