LDAP schema information gathering |
---|
Risk Level: | Medium | Check or Attack Name: LDAP Schema |
---|---|---|
Platforms: | LDAP | |
Description: | A potential attacker can gain information about the LDAP server by accessing the LDAP schema. The LDAP server dumps its schema, which can show all necessary attributes needed for an object, including hidden or non-readable attributes. |
|
Remedy: | Disable the cn=schema entry or allow only authorized users to view the entry. |
|
References: |
Know Your Risks |