A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.18.2+ds-1", "binary_name": "lemonldap-ng" }, { "binary_version": "2.18.2+ds-1", "binary_name": "lemonldap-ng-doc" }, { "binary_version": "2.18.2+ds-1", "binary_name": "lemonldap-ng-fastcgi-server" }, { "binary_version": "2.18.2+ds-1", "binary_name": "lemonldap-ng-handler" }, { "binary_version": "2.18.2+ds-1", "binary_name": "lemonldap-ng-uwsgi-app" }, { "binary_version": "2.18.2+ds-1", "binary_name": "liblemonldap-ng-common-perl" }, { "binary_version": "2.18.2+ds-1", "binary_name": "liblemonldap-ng-handler-perl" }, { "binary_version": "2.18.2+ds-1", "binary_name": "liblemonldap-ng-manager-perl" }, { "binary_version": "2.18.2+ds-1", "binary_name": "liblemonldap-ng-portal-perl" }, { "binary_version": "2.18.2+ds-1", "binary_name": "liblemonldap-ng-ssoaas-apache-client-perl" } ] }