An issue was discovered in LemonLDAP::NG before 2.0.12. There is a missing expiration check in the OAuth2.0 handler, i.e., it does not verify access token validity. An attacker can use a expired access token from an OIDC client to access the OAuth2 handler The earliest affected version is 2.0.4.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng" }, { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng-doc" }, { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng-fastcgi-server" }, { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng-handler" }, { "binary_version": "2.0.11+ds-4", "binary_name": "lemonldap-ng-uwsgi-app" }, { "binary_version": "2.0.11+ds-4", "binary_name": "liblemonldap-ng-common-perl" }, { "binary_version": "2.0.11+ds-4", "binary_name": "liblemonldap-ng-handler-perl" }, { "binary_version": "2.0.11+ds-4", "binary_name": "liblemonldap-ng-manager-perl" }, { "binary_version": "2.0.11+ds-4", "binary_name": "liblemonldap-ng-portal-perl" } ], "priority_reason": "Upstream rates this as being low severity" }