In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.
References
Link | Resource |
---|---|
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1943 | Permissions Required |
https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-7-is-out | Release Notes |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1943 | Permissions Required |
https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-7-is-out | Release Notes |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1943 - Permissions Required | |
References | () https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-7-is-out - Release Notes |
Information
Published : 2023-05-29 19:15
Updated : 2025-01-14 18:15
NVD link : CVE-2019-19791
Mitre link : CVE-2019-19791
CVE.ORG link : CVE-2019-19791
JSON object : View
Products Affected
lemonldap-ng
- lemonldap\
CWE