CVE-2019-15941
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/09/2019
Last modified:
28/05/2025
Description
OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:*:*:*:*:*:*:*:* | 2.0.0 (including) | 2.0.5 (including) |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1881
- https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-6-is-out/
- https://seclists.org/bugtraq/2019/Sep/46
- https://www.debian.org/security/2019/dsa-4533
- https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1881
- https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-6-is-out/
- https://seclists.org/bugtraq/2019/Sep/46
- https://www.debian.org/security/2019/dsa-4533