An issue was discovered in LemonLDAP::NG before 2.0.12. There is a missing expiration check in the OAuth2.0 handler, i.e., it does not verify access token validity. An attacker can use a expired access token from an OIDC client to access the OAuth2 handler The earliest affected version is 2.0.4.
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
Name | Vendor | Start Version | End Version |
---|---|---|---|
Lemonldap-ng | Ubuntu | bionic | * |
Lemonldap-ng | Ubuntu | hirsute | * |
Lemonldap-ng | Ubuntu | trusty | * |
Lemonldap-ng | Ubuntu | upstream | * |
Lemonldap-ng | Ubuntu | xenial | * |