Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an empty client_password parameter (client secret).
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.20.2+ds-1build1", "binary_name": "lemonldap-ng" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "lemonldap-ng-doc" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "lemonldap-ng-fastcgi-server" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "lemonldap-ng-handler" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "lemonldap-ng-uwsgi-app" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "liblemonldap-ng-common-perl" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "liblemonldap-ng-handler-perl" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "liblemonldap-ng-manager-perl" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "liblemonldap-ng-portal-perl" }, { "binary_version": "2.20.2+ds-1build1", "binary_name": "liblemonldap-ng-ssoaas-apache-client-perl" } ] }