Description
In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3284-1 | libapache-session-ldap-perl security update |
Debian DLA |
DLA-3285-1 | libapache-session-browseable-perl security update |
Debian DLA |
DLA-3287-1 | lemonldap-ng security update |
EUVD |
EUVD-2020-8060 | In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:37:53.067Z
Reserved: 2020-07-28T00:00:00.000Z
Link: CVE-2020-16093
No data.
Status : Modified
Published: 2022-07-18T00:15:08.193
Modified: 2024-11-21T05:06:45.193
Link: CVE-2020-16093
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD