An issue was discovered in LemonLDAP::NG before 2.16.1. Weak session ID generation in the AuthBasic handler and incorrect failure handling during a password check allow attackers to bypass 2FA verification. Any plugin that tries to deny session creation after the store step does not deny an AuthBasic session.
References
Link | Resource |
---|---|
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2896 | Exploit Issue Tracking Patch |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.16.1 | Release Notes |
https://lists.debian.org/debian-lts-announce/2023/07/msg00018.html |
Configurations
History
No history.
Information
Published : 2023-03-31 17:15
Updated : 2023-07-14 13:15
NVD link : CVE-2023-28862
Mitre link : CVE-2023-28862
CVE.ORG link : CVE-2023-28862
JSON object : View
Products Affected
lemonldap-ng
- lemonldap\
CWE
CWE-287
Improper Authentication