CVE Vulnerabilities

CVE-2021-35473

Insufficient Session Expiration

Published: Nov 10, 2024 | Modified: Nov 19, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
LOW

An issue was discovered in LemonLDAP::NG before 2.0.12. There is a missing expiration check in the OAuth2.0 handler, i.e., it does not verify access token validity. An attacker can use a expired access token from an OIDC client to access the OAuth2 handler The earliest affected version is 2.0.4.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Lemonldap-ng Ubuntu bionic *
Lemonldap-ng Ubuntu hirsute *
Lemonldap-ng Ubuntu trusty *
Lemonldap-ng Ubuntu upstream *
Lemonldap-ng Ubuntu xenial *

Potential Mitigations

References