Improper Certificate Validation Affecting lemonldap-ng package, versions <2.0.9+ds-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-LEMONLDAPNG-1549852
  • published7 Sept 2020
  • disclosed18 Jul 2022

Introduced: 7 Sep 2020

CVE-2020-16093  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade Debian:12 lemonldap-ng to version 2.0.9+ds-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lemonldap-ng package and not the lemonldap-ng package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.

CVSS Scores

version 3.1