First published: Sun Jul 17 2022(Updated: )
An issue was discovered in LemonLDAP::NG (aka lemonldap-ng) 2.0.13. When using the RESTServer plug-in to operate a REST password validation service (for another LemonLDAP::NG instance, for example) and using the Kerberos authentication method combined with another method with the Combination authentication plug-in, any password will be recognized as valid for an existing user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LemonLDAP::NG | =\-ng | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40874 has been rated as a high severity vulnerability due to its potential to allow unauthorized access when exploiting improper authentication methods.
To fix CVE-2021-40874, you should upgrade to LemonLDAP::NG version 2.0.14 or later, which includes a patch for this vulnerability.
CVE-2021-40874 affects LemonLDAP::NG version 2.0.13 specifically, as well as Debian GNU/Linux 10.0 if using the vulnerable plugin.
CVE-2021-40874 involves the Kerberos authentication method in combination with other methods within the RESTServer plug-in.
Yes, CVE-2021-40874 can potentially be exploited remotely, allowing attackers to bypass authentication under certain conditions.