First published: Tue Jul 27 2021(Updated: )
An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lemonldap-ng | 2.0.2+ds-7+deb10u7 2.0.2+ds-7+deb10u10 2.0.11+ds-4+deb11u5 2.16.1+ds-deb12u2 2.17.1+ds-1 | |
LemonLDAP::NG | <=2.0.11 | |
Debian Linux | =10.0 |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-35472 is rated as high with a CVSS score of 8.8.
An attacker can exploit CVE-2021-35472 by causing session cache corruption, leading to authorization bypass or spoofing by making many authentication attempts.
The affected software for CVE-2021-35472 includes LemonLDAP::NG versions before 2.0.12 and specific Debian packages as listed in the advisory.