Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-19791

Опубликовано: 29 мая 2023
Источник: debian
EPSS Низкий

Описание

In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lemonldap-ngfixed2.0.7+ds-1package
lemonldap-ngfixed2.0.2+ds-7+deb10u3busterpackage
lemonldap-ngno-dsastretchpackage
lemonldap-ngno-dsajessiepackage

Примечания

  • https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1943

  • https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-7-is-out/

EPSS

Процентиль: 9%
0.00032
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 2 лет назад

In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.

CVSS3: 9.8
nvd
больше 2 лет назад

In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.

CVSS3: 9.8
github
больше 2 лет назад

In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.

EPSS

Процентиль: 9%
0.00032
Низкий