Lemonldap Ng Lemonldap Ng

Do you want an email whenever new security vulnerabilities are reported in any Lemonldap Ng product?

Products by Lemonldap Ng Sorted by Most Security Vulnerabilities since 2018

Lemonldap Ng Lemonldap10 vulnerabilities

Lemonldap Ng Apache2 vulnerabilities

By the Year

In 2024 there have been 0 vulnerabilities in Lemonldap Ng . Last year Lemonldap Ng had 6 security vulnerabilities published. Right now, Lemonldap Ng is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 6 7.67
2022 2 8.65
2021 1 8.80
2020 0 0.00
2019 3 9.23
2018 0 0.00

It may take a day or so for new Lemonldap Ng vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Lemonldap Ng Security Vulnerabilities

A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1

CVE-2023-44469 4.3 - Medium - September 29, 2023

A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.

XSPA

In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7

CVE-2019-19791 9.8 - Critical - May 29, 2023

In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.

In LemonLDAP::NG before 2.0.15

CVE-2022-37186 5.9 - Medium - April 16, 2023

In LemonLDAP::NG before 2.0.15. some sessions are not deleted when they are supposed to be deleted according to the timeoutActivity setting. This can occur when there are at least two servers, and a session is manually removed before the time at which it would have been removed automatically.

Insufficient Session Expiration

An issue was discovered in LemonLDAP::NG before 2.16.1

CVE-2023-28862 9.8 - Critical - March 31, 2023

An issue was discovered in LemonLDAP::NG before 2.16.1. Weak session ID generation in the AuthBasic handler and incorrect failure handling during a password check allow attackers to bypass 2FA verification. Any plugin that tries to deny session creation after the store step does not deny an AuthBasic session.

authentification

In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends

CVE-2020-36659 8.1 - High - January 27, 2023

In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

Improper Certificate Validation

In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends

CVE-2020-36658 8.1 - High - January 27, 2023

In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

Improper Certificate Validation

An issue was discovered in LemonLDAP::NG (aka lemonldap-ng) 2.0.13

CVE-2021-40874 9.8 - Critical - July 18, 2022

An issue was discovered in LemonLDAP::NG (aka lemonldap-ng) 2.0.13. When using the RESTServer plug-in to operate a REST password validation service (for another LemonLDAP::NG instance, for example) and using the Kerberos authentication method combined with another method with the Combination authentication plug-in, any password will be recognized as valid for an existing user.

authentification

In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends

CVE-2020-16093 7.5 - High - July 18, 2022

In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.

Improper Certificate Validation

An issue was discovered in LemonLDAP::NG before 2.0.12

CVE-2021-35472 8.8 - High - July 30, 2021

An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.

Improper Restriction of Excessive Authentication Attempts

OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may

CVE-2019-15941 9.8 - Critical - September 25, 2019

OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.

AuthZ

LemonLDAP::NG before 1.9.20 has an XML External Entity (XXE) issue when submitting a notification to the notification server

CVE-2019-13031 8.1 - High - June 28, 2019

LemonLDAP::NG before 1.9.20 has an XML External Entity (XXE) issue when submitting a notification to the notification server. By default, the notification server is not enabled and has a "deny all" rule.

XXE

LemonLDAP::NG -2.0.3 has Incorrect Access Control.

CVE-2019-12046 9.8 - Critical - May 22, 2019

LemonLDAP::NG -2.0.3 has Incorrect Access Control.

Insufficiently Protected Credentials

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.