CVE-2019-15941
Published: 25 September 2019
OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.
Priority
Status
Package | Release | Status |
---|---|---|
lemonldap-ng Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Not vulnerable
(2.0.6+ds-2)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(2.0.6+ds-1)
|
|
xenial |
Needs triage
|
|
lunar |
Not vulnerable
(2.0.6+ds-2)
|
|
groovy |
Not vulnerable
(2.0.6+ds-2)
|
|
hirsute |
Not vulnerable
(2.0.6+ds-2)
|
|
impish |
Not vulnerable
(2.0.6+ds-2)
|
|
jammy |
Not vulnerable
(2.0.6+ds-2)
|
|
kinetic |
Not vulnerable
(2.0.6+ds-2)
|
|
mantic |
Not vulnerable
(2.0.6+ds-2)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |