An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
{
"binaries": [
{
"binary_name": "lemonldap-ng",
"binary_version": "1.4.6-3"
},
{
"binary_name": "liblemonldap-ng-common-perl",
"binary_version": "1.4.6-3"
},
{
"binary_name": "liblemonldap-ng-conf-perl",
"binary_version": "1.4.6-3"
},
{
"binary_name": "liblemonldap-ng-handler-perl",
"binary_version": "1.4.6-3"
},
{
"binary_name": "liblemonldap-ng-manager-perl",
"binary_version": "1.4.6-3"
},
{
"binary_name": "liblemonldap-ng-portal-perl",
"binary_version": "1.4.6-3"
}
]
}
{
"binaries": [
{
"binary_name": "lemonldap-ng",
"binary_version": "1.9.16-2"
},
{
"binary_name": "lemonldap-ng-fastcgi-server",
"binary_version": "1.9.16-2"
},
{
"binary_name": "lemonldap-ng-handler",
"binary_version": "1.9.16-2"
},
{
"binary_name": "liblemonldap-ng-common-perl",
"binary_version": "1.9.16-2"
},
{
"binary_name": "liblemonldap-ng-handler-perl",
"binary_version": "1.9.16-2"
},
{
"binary_name": "liblemonldap-ng-manager-perl",
"binary_version": "1.9.16-2"
},
{
"binary_name": "liblemonldap-ng-portal-perl",
"binary_version": "1.9.16-2"
}
]
}
{
"binaries": [
{
"binary_name": "lemonldap-ng",
"binary_version": "2.0.7+ds-2"
},
{
"binary_name": "lemonldap-ng-fastcgi-server",
"binary_version": "2.0.7+ds-2"
},
{
"binary_name": "lemonldap-ng-handler",
"binary_version": "2.0.7+ds-2"
},
{
"binary_name": "lemonldap-ng-uwsgi-app",
"binary_version": "2.0.7+ds-2"
},
{
"binary_name": "liblemonldap-ng-common-perl",
"binary_version": "2.0.7+ds-2"
},
{
"binary_name": "liblemonldap-ng-handler-perl",
"binary_version": "2.0.7+ds-2"
},
{
"binary_name": "liblemonldap-ng-manager-perl",
"binary_version": "2.0.7+ds-2"
},
{
"binary_name": "liblemonldap-ng-portal-perl",
"binary_version": "2.0.7+ds-2"
}
]
}