CVE-2021-35472

An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

11 Aug 2021, 15:31

Type Values Removed Values Added
CPE cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.0
v3 : 8.8
CWE CWE-307
References (MISC) https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539 - (MISC) https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539 - Exploit, Patch, Third Party Advisory
References (MISC) https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags - (MISC) https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags - Patch, Third Party Advisory
References (CONFIRM) https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5 - (CONFIRM) https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5 - Patch, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2021/dsa-4943 - (DEBIAN) https://www.debian.org/security/2021/dsa-4943 - Third Party Advisory

30 Jul 2021, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-30 14:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-35472

Mitre link : CVE-2021-35472

CVE.ORG link : CVE-2021-35472


JSON object : View

Products Affected

debian

  • debian_linux

lemonldap-ng

  • lemonldap\
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts