An issue was discovered in LemonLDAP::NG through 2.0.8, when NGINX is used. An attacker may bypass URL-based access control to protected Virtual Hosts by submitting a non-normalized URI. This also affects versions before 0.5.2 of the "Lemonldap::NG handler for Node.js" package.
References
Link | Resource |
---|---|
https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/releases/tag/0.5.2 | Third Party Advisory |
https://github.com/LemonLDAPNG/node-lemonldap-ng-handler/security/advisories/GHSA-x44x-r84w-8v67 | Third Party Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2290 | Exploit Third Party Advisory |
https://www.debian.org/security/2020/dsa-4762 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-14T12:51:48
Updated: 2020-09-14T12:51:48
Reserved: 2020-08-26T00:00:00
Link: CVE-2020-24660
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-14T13:15:10.030
Modified: 2020-09-18T19:42:11.787
Link: CVE-2020-24660
JSON object: View
Redhat Information
No data.
CWE