First published: Fri Nov 06 2020(Updated: )
ad-ldap-connector's admin panel before version 5.0.13 does not provide csrf protection, which when exploited may result in remote code execution or confidential data loss. CSRF exploits may occur if the user visits a malicious page containing CSRF payload on the same machine that has access to the ad-ldap-connector admin console via a browser. You may be affected if you use the admin console included with ad-ldap-connector versions <=5.0.12. If you do not have ad-ldap-connector admin console enabled or do not visit any other public URL while on the machine it is installed on, you are not affected. The issue is fixed in version 5.0.13.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Auth0 Ad\/ldap Connector | <5.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15259 has a high severity level due to potential remote code execution and data loss risks.
To fix CVE-2020-15259, upgrade the ad-ldap-connector to version 5.0.13 or later to ensure CSRF protection is enabled.
The risks associated with CVE-2020-15259 include remote code execution and potential loss of confidential data if exploited.
Yes, CVE-2020-15259 specifically affects versions of the Auth0 ad-ldap-connector prior to version 5.0.13.
CVE-2020-15259 facilitates CSRF attacks that can lead to unauthorized actions being performed on behalf of an authenticated user.