CVE-2020-16093

In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.
References
Link Resource
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250 Exploit Issue Tracking Patch Third Party Advisory
https://lemonldap-ng.org/download Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00027.html Mailing List Third Party Advisory
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250 Exploit Issue Tracking Patch Third Party Advisory
https://lemonldap-ng.org/download Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00027.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:06

Type Values Removed Values Added
References () https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://lemonldap-ng.org/download - Vendor Advisory () https://lemonldap-ng.org/download - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/01/msg00027.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/01/msg00027.html - Mailing List, Third Party Advisory

Information

Published : 2022-07-18 00:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-16093

Mitre link : CVE-2020-16093

CVE.ORG link : CVE-2020-16093


JSON object : View

Products Affected

debian

  • debian_linux

lemonldap-ng

  • lemonldap\
CWE
CWE-295

Improper Certificate Validation