An issue was discovered in LemonLDAP::NG before 2.0.12. There is a missing expiration check in the OAuth2.0 handler, i.e., it does not verify access token validity. An attacker can use a expired access token from an OIDC client to access the OAuth2 handler The earliest affected version is 2.0.4.
References
Configurations
No configuration.
History
19 Nov 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-613 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
12 Nov 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Nov 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-10 23:15
Updated : 2024-11-19 20:35
NVD link : CVE-2021-35473
Mitre link : CVE-2021-35473
CVE.ORG link : CVE-2021-35473
JSON object : View
Products Affected
No product.
CWE
CWE-613
Insufficient Session Expiration