CVE-2020-16093

In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.
References
Link Resource
https://lemonldap-ng.org/download Vendor Advisory
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250 Exploit Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00027.html Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Information

Published : 2022-07-17 17:15

Updated : 2023-02-28 10:29


NVD link : CVE-2020-16093

Mitre link : CVE-2020-16093


JSON object : View

CWE
CWE-295

Improper Certificate Validation

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

lemonldap-ng

  • lemonldap\