First published: Mon May 29 2023(Updated: )
In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LemonLDAP::NG | <2.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19791 has been rated as a medium severity vulnerability.
To fix CVE-2019-19791, upgrade LemonLDAP::NG to version 2.0.7 or later.
CVE-2019-19791 allows attackers to bypass access restrictions and potentially access sensitive SOAP/REST endpoints.
CVE-2019-19791 affects all versions of LemonLDAP::NG prior to 2.0.7.
A temporary workaround for CVE-2019-19791 may include manually configuring Apache HTTP Server to restrict access to vulnerable endpoints.