CVE Vulnerabilities

CVE-2021-35473

Insufficient Session Expiration

Published: Nov 10, 2024 | Modified: Nov 19, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An issue was discovered in LemonLDAP::NG before 2.0.12. There is a missing expiration check in the OAuth2.0 handler, i.e., it does not verify access token validity. An attacker can use a expired access token from an OIDC client to access the OAuth2 handler The earliest affected version is 2.0.4.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
Lemonldap-ngUbuntubionic*
Lemonldap-ngUbuntufocal*
Lemonldap-ngUbuntuhirsute*
Lemonldap-ngUbuntutrusty*
Lemonldap-ngUbuntuupstream*
Lemonldap-ngUbuntuxenial*

Potential Mitigations

References