Lucene search

K
nvd[email protected]NVD:CVE-2020-36658
HistoryJan 27, 2023 - 5:15 a.m.

CVE-2020-36658

2023-01-2705:15:12
CWE-295
web.nvd.nist.gov
7
apache
session
ldap
x.509 certificate
validity issue
net::ldaps
remote ldap backends
cve-2020-36658
fix

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

49.3%

In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

Affected configurations

Nvd
Node
lemonldap-ngapache\Match\session\\ldap
Node
debiandebian_linuxMatch10.0
VendorProductVersionCPE
lemonldap-ngapache\cpe:2.3:a:lemonldap-ng:apache\:\:session\:\:ldap:*:*:*:*:*:perl:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

49.3%