CVE-2020-15259

ad-ldap-connector's admin panel before version 5.0.13 does not provide csrf protection, which when exploited may result in remote code execution or confidential data loss. CSRF exploits may occur if the user visits a malicious page containing CSRF payload on the same machine that has access to the ad-ldap-connector admin console via a browser. You may be affected if you use the admin console included with ad-ldap-connector versions <=5.0.12. If you do not have ad-ldap-connector admin console enabled or do not visit any other public URL while on the machine it is installed on, you are not affected. The issue is fixed in version 5.0.13.
Configurations

Configuration 1 (hide)

cpe:2.3:a:auth0:ad\/ldap_connector:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:05

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 8.8
v2 : 6.8
v3 : 8.1
References () https://github.com/auth0/ad-ldap-connector/commit/8b793631ec5ecacf63ff3ece23231a9e138ae911 - Patch, Third Party Advisory () https://github.com/auth0/ad-ldap-connector/commit/8b793631ec5ecacf63ff3ece23231a9e138ae911 - Patch, Third Party Advisory
References () https://github.com/auth0/ad-ldap-connector/security/advisories/GHSA-vx5q-cp9v-427v - Third Party Advisory () https://github.com/auth0/ad-ldap-connector/security/advisories/GHSA-vx5q-cp9v-427v - Third Party Advisory

Information

Published : 2020-11-06 20:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15259

Mitre link : CVE-2020-15259

CVE.ORG link : CVE-2020-15259


JSON object : View

Products Affected

auth0

  • ad\/ldap_connector
CWE
CWE-352

Cross-Site Request Forgery (CSRF)