An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
References
Link | Resource |
---|---|
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539 | Exploit Patch Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags | Patch Third Party Advisory |
https://www.debian.org/security/2021/dsa-4943 | Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5 | Patch Third Party Advisory |
Information
Published : 2021-07-30 07:15
Updated : 2021-08-11 08:31
NVD link : CVE-2021-35472
Mitre link : CVE-2021-35472
JSON object : View
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
Products Affected
debian
- debian_linux
lemonldap-ng
- lemonldap\