CVE-2023-44469

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-44469
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-44469.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-44469
Related
Published
2023-09-29T07:15:14Z
Modified
2025-01-08T09:38:07.644187Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.

References

Affected packages

Debian:11 / lemonldap-ng

Package

Name
lemonldap-ng
Purl
pkg:deb/debian/lemonldap-ng?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.11+ds-4+deb11u5

Affected versions

2.*

2.0.11+ds-4
2.0.11+ds-4+deb11u1
2.0.11+ds-4+deb11u2
2.0.11+ds-4+deb11u4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / lemonldap-ng

Package

Name
lemonldap-ng
Purl
pkg:deb/debian/lemonldap-ng?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.16.1+ds-deb12u2

Affected versions

2.*

2.16.1+ds-2
2.16.1+ds-deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / lemonldap-ng

Package

Name
lemonldap-ng
Purl
pkg:deb/debian/lemonldap-ng?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.17.1+ds-1

Affected versions

2.*

2.16.1+ds-2
2.16.1+ds-deb12u1
2.16.1+ds-deb12u2
2.16.1+ds-deb12u3
2.16.1+ds-deb12u4
2.16.2+ds-1
2.17.0+ds-1~bpo12+1
2.17.0+ds-1
2.17.0+ds2-1~bpo11+1
2.17.0+ds2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}