A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.
References
Link | Resource |
---|---|
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2998 | Issue Tracking Patch Vendor Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.17.1 | Issue Tracking Release Notes |
https://lists.debian.org/debian-lts-announce/2023/10/msg00014.html | |
https://security.lauritz-holtmann.de/post/sso-security-ssrf/ | Not Applicable |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2998 | Issue Tracking Patch Vendor Advisory |
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.17.1 | Issue Tracking Release Notes |
https://lists.debian.org/debian-lts-announce/2023/10/msg00014.html | |
https://security.lauritz-holtmann.de/post/sso-security-ssrf/ | Not Applicable |
Configurations
History
21 Nov 2024, 08:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-29 07:15
Updated : 2024-11-21 08:25
NVD link : CVE-2023-44469
Mitre link : CVE-2023-44469
CVE.ORG link : CVE-2023-44469
JSON object : View
Products Affected
lemonldap-ng
- lemonldap\
CWE
CWE-918
Server-Side Request Forgery (SSRF)