CVE-2019-15941

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-15941
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-15941.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-15941
Related
Published
2019-09-25T20:15:11Z
Modified
2024-11-05T06:50:10.173998Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.

References

Affected packages

Debian:11 / lemonldap-ng

Package

Name
lemonldap-ng
Purl
pkg:deb/debian/lemonldap-ng?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.6+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / lemonldap-ng

Package

Name
lemonldap-ng
Purl
pkg:deb/debian/lemonldap-ng?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.6+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / lemonldap-ng

Package

Name
lemonldap-ng
Purl
pkg:deb/debian/lemonldap-ng?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.6+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / gitlab.ow2.org/lemonldap-ng/lemonldap-ng

Affected ranges

Type
GIT
Repo
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng
Events

Affected versions

Other

debian/buster
ubuntu/disco
ubuntu/eoan

v2.*

v2.0.0
v2.0.1
v2.0.2
v2.0.3
v2.0.4
v2.0.5