In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "lemonldap-ng", "binary_version": "2.0.7+ds-2" }, { "binary_name": "lemonldap-ng-doc", "binary_version": "2.0.7+ds-2" }, { "binary_name": "lemonldap-ng-fastcgi-server", "binary_version": "2.0.7+ds-2" }, { "binary_name": "lemonldap-ng-handler", "binary_version": "2.0.7+ds-2" }, { "binary_name": "lemonldap-ng-uwsgi-app", "binary_version": "2.0.7+ds-2" }, { "binary_name": "liblemonldap-ng-common-perl", "binary_version": "2.0.7+ds-2" }, { "binary_name": "liblemonldap-ng-handler-perl", "binary_version": "2.0.7+ds-2" }, { "binary_name": "liblemonldap-ng-manager-perl", "binary_version": "2.0.7+ds-2" }, { "binary_name": "liblemonldap-ng-portal-perl", "binary_version": "2.0.7+ds-2" } ], "ubuntu_priority": "medium" }