Potential leak of data: LDAP Admin
Detected 1 occurrence(s) of ‘CN\=Admin’:
- The domain name after the '@'. // %dc - The domain name hierarchal string e.g. "dc=test,dc=domain,dc=com" // %dn - DN found by ldap search when search_filter/search_base_dn are used 'base_dn' => 'dc=titi,dc=local', 'bind_dn' => 'cn=admin,dc=titi,dc=local', 'bind_pass' => '', // It's possible to bind for an individual address book // The login name is used to search for the DN to bind with 'search_base_dn' => '', 'search_filter' => ')', // e.g. '(&(objectClass=posixAc
If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.
This entry was posted on Monday, June 18th, 2012 at 18:17 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.
Thank you very much for your report. We will process it as soon as possible!