Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • G gitlabhq1
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 21
    • Issues 21
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 12
    • Merge requests 12
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • gpt
  • large_projects
  • gitlabhq1
  • Issues
  • #978

Closed
Open
Created Jun 25, 2012 by Administrator@rootOwner

LDAP sign-in accepts blank passwords as valid

Created by: BHSPitMonkey

Using the LDAP/omniauth functionality, I seem to be able to illegitimately sign in as any user by simply providing their username and leaving the password field blank at the login page. Providing an incorrect (but non-blank) password correctly results in a "Invalid Credentials" message, but leaving the password completely blank results in a successful authentication. This is a very critical problem for LDAP users!

Is anyone else able to recreate this behavior?

Assignee
Assign to
Time tracking