A cross-site scripting (XSS) vulnerability in LemonLDAP::NG before 2.20.1 allows remote attackers to inject arbitrary web script or HTML via the url parameter of the upgrade session confirmation page (upgradeSession / forceUpgrade) if the "Upgrade session" plugin has been enabled by an admin
{ "availability": "No subscription required", "binaries": [ { "binary_name": "lemonldap-ng", "binary_version": "2.20.1+ds-1" }, { "binary_name": "lemonldap-ng-doc", "binary_version": "2.20.1+ds-1" }, { "binary_name": "lemonldap-ng-fastcgi-server", "binary_version": "2.20.1+ds-1" }, { "binary_name": "lemonldap-ng-handler", "binary_version": "2.20.1+ds-1" }, { "binary_name": "lemonldap-ng-uwsgi-app", "binary_version": "2.20.1+ds-1" }, { "binary_name": "liblemonldap-ng-common-perl", "binary_version": "2.20.1+ds-1" }, { "binary_name": "liblemonldap-ng-handler-perl", "binary_version": "2.20.1+ds-1" }, { "binary_name": "liblemonldap-ng-manager-perl", "binary_version": "2.20.1+ds-1" }, { "binary_name": "liblemonldap-ng-portal-perl", "binary_version": "2.20.1+ds-1" }, { "binary_name": "liblemonldap-ng-ssoaas-apache-client-perl", "binary_version": "2.20.1+ds-1" } ] }