Moonraker with LDAP Enabled Allows Malicious Search Filter Injection
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
References
- https://github.com/Arksine/moonraker/security/advisories/GHSA-3jqf-v4mv-747g x_refsource_CONFIRM
- https://github.com/Arksine/moonraker/commit/74c5d8e44c4a4abbfbb06fb991e7ebb9ac947f42 x_refsource_MISC
- https://github.com/Arksine/moonraker/commit/74c5d8e44c4a4abbfbb06fb991e7ebb9ac947f42 x_refsource_MISC
- https://github.com/Arksine/moonraker/security/advisories/GHSA-3jqf-v4mv-747g x_refsource_CONFIRM
Affected products
moonraker
- ==< 0.10.0
Matching in nixpkgs
pkgs.moonraker
API web server for Klipper
-
nixos-unstable 0.9.3-unstable-2025-11-10
- nixpkgs-unstable 0.9.3-unstable-2025-11-10
- nixos-unstable-small 0.9.3-unstable-2025-11-16
pkgs.python312Packages.moonraker-api
Python API for the Moonraker API
pkgs.python313Packages.moonraker-api
Python API for the Moonraker API
pkgs.home-assistant-custom-components.moonraker
Custom integration for Moonraker and Klipper in Home Assistant
Package maintainers
-
@9R 9R <nix@9-r.net>
-
@zhaofengli Zhaofeng Li <hello@zhaofeng.li>
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>