An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Link | Tags |
---|---|
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539 | third party advisory exploit patch |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags | patch third party advisory |
https://www.debian.org/security/2021/dsa-4943 | vendor advisory third party advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5 | patch third party advisory |