Skip to content

Instantly share code, notes, and snippets.

@pentestrox
Created January 17, 2026 06:22
Show Gist options
  • Select an option

  • Save pentestrox/e8ca87b66023428feac920f030f34a40 to your computer and use it in GitHub Desktop.

Select an option

Save pentestrox/e8ca87b66023428feac920f030f34a40 to your computer and use it in GitHub Desktop.

CVE-2025-65819 — Unauthorized Configuration Modification in Dovestones AD Phonebook

Summary

Dovestones Software AD Phonebook versions prior to 4.0.0.11 contain an access control flaw in an administrative configuration endpoint that allows unauthenticated attackers to modify application settings despite an HTTP 401 response.


Vulnerability Details

Vulnerability Type

Incorrect Access Control

Description

In Dovestones Software AD Phonebook before version 4.0.0.11, the /ADPhonebook/Admin/Save endpoint fails to properly enforce authentication and authorization. Although the endpoint returns an HTTP 401 Unauthorized response to unauthenticated requests, the backend logic still processes and persists submitted configuration data.

As a result, a remote, unauthenticated attacker can send crafted HTTP POST requests to this endpoint and modify sensitive application configuration settings without valid credentials.

Affected Products

  • Product: Dovestones Software AD Phonebook
  • Versions Affected: All versions prior to 4.0.0.11
  • Tested Version: 4.0.0.10
  • Fixed Version: 4.0.0.11

Affected Component

  • /ADPhonebook/Admin/Save endpoint
  • Administrative configuration controller
  • Authentication and authorization middleware
  • Configuration persistence logic

Impact

Successful exploitation may allow:

  • Unauthorized modification of application configuration, including LDAP and authentication settings
  • Loss of integrity of security-critical configuration data
  • Potential information disclosure of sensitive configuration values

Attack Vector

  • Attack Type: Remote
  • Authentication Required: No
  • Exploitation Method: Crafted HTTP POST request to the vulnerable endpoint
  • User Interaction Required: No

Mitigation / Remediation

Upgrade to Dovestones Software AD Phonebook version 4.0.0.11 or later, which correctly enforces authentication and authorization checks before processing configuration updates.


Vendor Acknowledgment

The vendor has confirmed and acknowledged this vulnerability.


Discovery

  • Discovered by: Fedrick R. Sequeira (Accenture)
  • Discovery Date: October 18, 2024

References

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment