Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-45160

Опубликовано: 09 окт. 2024
Источник: debian
EPSS Низкий

Описание

Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an empty client_password parameter (client secret).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lemonldap-ngfixed2.19.2+ds-1package
lemonldap-ngnot-affectedbookwormpackage
lemonldap-ngnot-affectedbullseyepackage

Примечания

  • https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3223

  • Introduced by: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/06d771cbc2d5c752354c50f83e4912e5879f9aa2 (v2.18.0)

  • Unit test: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/236cdfe42c1dc04a15a4a40c5e6a8c2e858d71d7 (v2.19.2)

  • Fixed by: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/696f49a0855faeb271096dccb8381e2129687c3d (v2.19.2)

EPSS

Процентиль: 30%
0.00114
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 1 года назад

Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an empty client_password parameter (client secret).

CVSS3: 9.1
nvd
больше 1 года назад

Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an empty client_password parameter (client secret).

CVSS3: 9.1
github
больше 1 года назад

Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an empty client_password parameter (client secret).

EPSS

Процентиль: 30%
0.00114
Низкий