An issue was discovered in LemonLDAP::NG through 2.0.8, when NGINX is used. An attacker may bypass URL-based access control to protected Virtual Hosts by submitting a non-normalized URI. This also affects versions before 0.5.2 of the "Lemonldap::NG handler for Node.js" package.
References
Link | Resource |
---|---|
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2290 | Exploit Third Party Advisory |
https://www.debian.org/security/2020/dsa-4762 | Third Party Advisory |
https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/releases/tag/0.5.2 | Third Party Advisory |
https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/security/advisories/GHSA-x44x-r84w-8v67 | Third Party Advisory |
Information
Published : 2020-09-14 06:15
Updated : 2020-09-18 12:42
NVD link : CVE-2020-24660
Mitre link : CVE-2020-24660
JSON object : View
CWE
CWE-425
Direct Request ('Forced Browsing')
Products Affected
debian
- debian_linux
lemonldap-ng
- lemonldap\