An issue was discovered in LemonLDAP::NG through 2.0.8, when NGINX is used. An attacker may bypass URL-based access control to protected Virtual Hosts by submitting a non-normalized URI. This also affects versions before 0.5.2 of the "Lemonldap::NG handler for Node.js" package.
The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.
Link | Tags |
---|---|
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2290 | third party advisory exploit |
https://www.debian.org/security/2020/dsa-4762 | third party advisory vendor advisory |
https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/security/advisories/GHSA-x44x-r84w-8v67 | third party advisory |
https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/releases/tag/0.5.2 | third party advisory |