Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-35472

Опубликовано: 30 июл. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lemonldap-ngfixed2.0.11+ds-4package
lemonldap-ngnot-affectedstretchpackage

Примечания

  • https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539

EPSS

Процентиль: 58%
0.00366
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 4 лет назад

An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.

CVSS3: 8.8
nvd
больше 4 лет назад

An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.

github
больше 3 лет назад

An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.

CVSS3: 7.7
fstec
больше 4 лет назад

Уязвимость системы аутентификации для веб-приложений LemonLDAP::NG, связанная с ошибкой обработки ключей авторизации, позволяющая нарушителю проводить спуфинг-атаки

EPSS

Процентиль: 58%
0.00366
Низкий