CVE-2026-24130

5.3 MEDIUM

📋 TL;DR

Moonraker versions 0.9.3 and below with LDAP enabled are vulnerable to LDAP injection attacks through the login endpoint. Attackers can use error messages to brute-force LDAP entries and discover user IDs and attributes. This affects systems using Moonraker's LDAP authentication component.

💻 Affected Systems

Products:
  • Moonraker
Versions: 0.9.3 and below
Operating Systems: All platforms running Moonraker
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when LDAP component is enabled in configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate all LDAP user accounts and attributes, potentially leading to credential harvesting and unauthorized access to the 3D printing system.

🟠

Likely Case

LDAP directory enumeration allowing discovery of valid usernames and user attributes for targeted attacks.

🟢

If Mitigated

Limited information disclosure if LDAP directory contains minimal sensitive data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires LDAP to be enabled and uses standard LDAP injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.10.0

Vendor Advisory: https://github.com/Arksine/moonraker/security/advisories/GHSA-3jqf-v4mv-747g

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Update Moonraker to version 0.10.0 or later. 3. Restart Moonraker service. 4. Verify LDAP authentication still works correctly.

🔧 Temporary Workarounds

Disable LDAP Authentication

all

Temporarily disable LDAP authentication until patching is possible

Edit moonraker.conf and set 'enable_ldap: false' or remove LDAP configuration section

🧯 If You Can't Patch

  • Disable LDAP authentication in Moonraker configuration
  • Restrict network access to Moonraker API endpoints

🔍 How to Verify

Check if Vulnerable:

Check Moonraker version with 'python -m moonraker --version' and verify LDAP is enabled in configuration

Check Version:

python -m moonraker --version

Verify Fix Applied:

Confirm version is 0.10.0 or higher and test LDAP authentication functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple 401 errors with varying LDAP filter patterns
  • Unusual LDAP query patterns in authentication logs

Network Indicators:

  • Repeated POST requests to /access/login with varying parameters
  • LDAP injection patterns in HTTP requests

SIEM Query:

source="moonraker.log" AND "401" AND "login" AND ("LDAP" OR "filter")

🔗 References

📤 Share & Export