9.8
CVSSv3

CVE-2019-15941

Published: 25/09/2019 Updated: 18/08/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

OpenID Connect Issuer in LemonLDAP::NG 2.x up to and including 2.0.5 may allow an malicious user to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

lemonldap-ng lemonldap\\ \\

debian debian linux 10.0

Vendor Advisories

It was discovered that the Lemonldap::NG web SSO system did not restrict OIDC authorization codes to the relying party For the stable distribution (buster), this problem has been fixed in version 202+ds-7+deb10u2 We recommend that you upgrade your lemonldap-ng packages For the detailed security status of lemonldap-ng please refer to its securi ...