CVE-2021-40874

An issue was discovered in LemonLDAP::NG (aka lemonldap-ng) 2.0.13. When using the RESTServer plug-in to operate a REST password validation service (for another LemonLDAP::NG instance, for example) and using the Kerberos authentication method combined with another method with the Combination authentication plug-in, any password will be recognized as valid for an existing user.
References
Link Resource
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612 Exploit Issue Tracking Patch Third Party Advisory
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612 Exploit Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:2.0.13:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:24

Type Values Removed Values Added
References () https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612 - Exploit, Issue Tracking, Patch, Third Party Advisory

Information

Published : 2022-07-18 00:15

Updated : 2024-11-21 06:24


NVD link : CVE-2021-40874

Mitre link : CVE-2021-40874

CVE.ORG link : CVE-2021-40874


JSON object : View

Products Affected

debian

  • debian_linux

lemonldap-ng

  • lemonldap\
CWE
CWE-287

Improper Authentication