Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-15941

Опубликовано: 25 сент. 2019
Источник: debian
EPSS Низкий

Описание

OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lemonldap-ngfixed2.0.6+ds-1package
lemonldap-ngignoredstretchpackage
lemonldap-ngnot-affectedjessiepackage

Примечания

  • Vulnerability exists pre-2.0 versions, but as restrictions on OIDC federation

  • were added only in 2.0 the vulnerability has no effect. The vulnerability

  • itself exists only with versions >= 1.9.0 (as there is no OIDC before)

EPSS

Процентиль: 60%
0.00395
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.

CVSS3: 9.8
nvd
больше 6 лет назад

OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.

CVSS3: 9.8
github
больше 3 лет назад

OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость системы аутентификации для веб-приложений LemonLDAP::NG, связанная с неправильной авторизацией, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность

EPSS

Процентиль: 60%
0.00395
Низкий