Incorrect Authorization Affecting lemonldap-ng package, versions <2.0.6+ds-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-LEMONLDAPNG-469048
- published 24 Sep 2019
- disclosed 25 Sep 2019
Introduced: 24 Sep 2019
CVE-2019-15941 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
lemonldap-ng
to version 2.0.6+ds-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream lemonldap-ng
package and not the lemonldap-ng
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.