An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
References
Link | Resource |
---|---|
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5 | Patch Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539 | Exploit Patch Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags | Patch Third Party Advisory |
https://www.debian.org/security/2021/dsa-4943 | Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5 | Patch Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539 | Exploit Patch Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags | Patch Third Party Advisory |
https://www.debian.org/security/2021/dsa-4943 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5 - Patch, Third Party Advisory | |
References | () https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539 - Exploit, Patch, Third Party Advisory | |
References | () https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags - Patch, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4943 - Third Party Advisory |
Information
Published : 2021-07-30 14:15
Updated : 2024-11-21 06:12
NVD link : CVE-2021-35472
Mitre link : CVE-2021-35472
CVE.ORG link : CVE-2021-35472
JSON object : View
Products Affected
debian
- debian_linux
lemonldap-ng
- lemonldap\
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts