An issue was discovered in LemonLDAP::NG before 2.16.1. Weak session ID generation in the AuthBasic handler and incorrect failure handling during a password check allow attackers to bypass 2FA verification. Any plugin that tries to deny session creation after the store step does not deny an AuthBasic session.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Lemonldap::ng | Lemonldap-ng | * | 2.16.1 (excluding) |
Lemonldap-ng | Ubuntu | bionic | * |
Lemonldap-ng | Ubuntu | kinetic | * |
Lemonldap-ng | Ubuntu | lunar | * |
Lemonldap-ng | Ubuntu | mantic | * |
Lemonldap-ng | Ubuntu | trusty | * |
Lemonldap-ng | Ubuntu | upstream | * |
Lemonldap-ng | Ubuntu | xenial | * |