First published: Fri Sep 29 2023(Updated: )
A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LemonLDAP::NG | <2.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-44469.
The severity of CVE-2023-44469 is medium.
LemonLDAP::NG versions up to and excluding 2.17.1 are affected by CVE-2023-44469.
CVE-2023-44469 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter in the OpenID Connect Issuer in LemonLDAP::NG.
Yes, here are some references for CVE-2023-44469: [1] (https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2998), [2] (https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.17.1), [3] (https://security.lauritz-holtmann.de/post/sso-security-ssrf/).