In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Apache::session::ldap | Lemonldap-ng | * | 0.5 (excluding) |
Libapache-session-ldap-perl | Ubuntu | bionic | * |
Libapache-session-ldap-perl | Ubuntu | esm-apps/bionic | * |
Libapache-session-ldap-perl | Ubuntu | esm-apps/xenial | * |
Libapache-session-ldap-perl | Ubuntu | focal | * |
Libapache-session-ldap-perl | Ubuntu | trusty | * |
Libapache-session-ldap-perl | Ubuntu | upstream | * |
Libapache-session-ldap-perl | Ubuntu | xenial | * |