In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.
{
"binaries": [
{
"binary_version": "1.4.6-3",
"binary_name": "lemonldap-ng"
},
{
"binary_version": "1.4.6-3",
"binary_name": "liblemonldap-ng-common-perl"
},
{
"binary_version": "1.4.6-3",
"binary_name": "liblemonldap-ng-conf-perl"
},
{
"binary_version": "1.4.6-3",
"binary_name": "liblemonldap-ng-handler-perl"
},
{
"binary_version": "1.4.6-3",
"binary_name": "liblemonldap-ng-manager-perl"
},
{
"binary_version": "1.4.6-3",
"binary_name": "liblemonldap-ng-portal-perl"
}
]
}
{
"binaries": [
{
"binary_version": "1.9.16-2",
"binary_name": "lemonldap-ng"
},
{
"binary_version": "1.9.16-2",
"binary_name": "lemonldap-ng-fastcgi-server"
},
{
"binary_version": "1.9.16-2",
"binary_name": "lemonldap-ng-handler"
},
{
"binary_version": "1.9.16-2",
"binary_name": "liblemonldap-ng-common-perl"
},
{
"binary_version": "1.9.16-2",
"binary_name": "liblemonldap-ng-handler-perl"
},
{
"binary_version": "1.9.16-2",
"binary_name": "liblemonldap-ng-manager-perl"
},
{
"binary_version": "1.9.16-2",
"binary_name": "liblemonldap-ng-portal-perl"
}
]
}