First published: Fri Jan 27 2023(Updated: )
In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LemonLDAP::NG Apache | <1.3.6 | |
Debian Linux | =10.0 | |
<1.3.6 | ||
=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-36659 is rated as high with a CVSS score of 8.1.
To fix CVE-2020-36659, it is recommended to update to Apache::Session::Browseable version 1.3.6 or later and ensure the X.509 certificate validity is checked when connecting to remote LDAP backends.