Name | CVE-2024-45160 |
Description | Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an empty client_password parameter (client secret). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
lemonldap-ng (PTS) | bullseye | 2.0.11+ds-4+deb11u5 | fixed |
| bookworm | 2.16.1+ds-deb12u3 | fixed |
| sid, trixie | 2.20.1+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - lemonldap-ng <not-affected> (Vulnerable code not present)
[bullseye] - lemonldap-ng <not-affected> (Vulnerable code not present)
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3223
Introduced by: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/06d771cbc2d5c752354c50f83e4912e5879f9aa2 (v2.18.0)
Unit test: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/236cdfe42c1dc04a15a4a40c5e6a8c2e858d71d7 (v2.19.2)
Fixed by: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/696f49a0855faeb271096dccb8381e2129687c3d (v2.19.2)