First published: Fri Mar 31 2023(Updated: )
An issue was discovered in LemonLDAP::NG before 2.16.1. Weak session ID generation in the AuthBasic handler and incorrect failure handling during a password check allow attackers to bypass 2FA verification. Any plugin that tries to deny session creation after the store step does not deny an AuthBasic session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LemonLDAP::NG | <2.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28862 has a high severity rating due to the ability to bypass two-factor authentication.
You can fix CVE-2023-28862 by upgrading to LemonLDAP::NG version 2.16.1 or later.
CVE-2023-28862 allows attackers to bypass two-factor authentication through weak session ID generation.
CVE-2023-28862 affects all versions of LemonLDAP::NG prior to 2.16.1.
Currently, the recommended action is to upgrade to the secure version, as no effective workaround is mentioned for CVE-2023-28862.