CVE Vulnerabilities

CVE-2020-36658

Improper Certificate Validation

Published: Jan 27, 2023 | Modified: Mar 28, 2025
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
Apache::session::ldapLemonldap-ng*0.5 (excluding)
Libapache-session-ldap-perlUbuntubionic*
Libapache-session-ldap-perlUbuntuesm-apps/bionic*
Libapache-session-ldap-perlUbuntuesm-apps/focal*
Libapache-session-ldap-perlUbuntuesm-apps/xenial*
Libapache-session-ldap-perlUbuntufocal*
Libapache-session-ldap-perlUbuntutrusty*
Libapache-session-ldap-perlUbuntuupstream*
Libapache-session-ldap-perlUbuntuxenial*

Potential Mitigations

References