Direct Request ('Forced Browsing') Affecting lemonldap-ng package, versions <1.9.7-3+deb9u4


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.87% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-LEMONLDAPNG-609893
  • published7 Sept 2020
  • disclosed14 Sept 2020

Introduced: 7 Sep 2020

CVE-2020-24660  (opens in a new tab)
CWE-425  (opens in a new tab)

How to fix?

Upgrade Debian:9 lemonldap-ng to version 1.9.7-3+deb9u4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lemonldap-ng package and not the lemonldap-ng package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

An issue was discovered in LemonLDAP::NG through 2.0.8, when NGINX is used. An attacker may bypass URL-based access control to protected Virtual Hosts by submitting a non-normalized URI. This also affects versions before 0.5.2 of the "Lemonldap::NG handler for Node.js" package.

CVSS Scores

version 3.1