An issue was discovered in LemonLDAP::NG through 2.0.8, when NGINX is used. An attacker may bypass URL-based access control to protected Virtual Hosts by submitting a non-normalized URI. This also affects versions before 0.5.2 of the "Lemonldap::NG handler for Node.js" package.
References
Link | Resource |
---|---|
https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/releases/tag/0.5.2 | Third Party Advisory |
https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/security/advisories/GHSA-x44x-r84w-8v67 | Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2290 | Exploit Third Party Advisory |
https://www.debian.org/security/2020/dsa-4762 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-09-14 13:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-24660
Mitre link : CVE-2020-24660
CVE.ORG link : CVE-2020-24660
JSON object : View
Products Affected
lemonldap-ng
- lemonldap\
debian
- debian_linux
CWE
CWE-425
Direct Request ('Forced Browsing')