Security Advisories (2)
CVE-2021-35472
(2021-07-30)
An issue was discovered in LemonLDAP::NG before 2.0.12. Session cache corruption can lead to authorization bypass or spoofing. By running a loop that makes many authentication attempts, an attacker might alternately be authenticated as one of two different users.
- https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2539
- https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags
- https://www.debian.org/security/2021/dsa-4943
- https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/8d3b763b6af2b8a9c4ad2765fbfabffec8a73af5
- https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/blob/master/changelog
CVE-2021-35473
OAuth2 handler does not verify access token validity
No POD found for Constants.pm.
Time to read the source?
Module Install Instructions
To install Lemonldap::NG::Common, copy and paste the appropriate command in to your terminal.
cpanm Lemonldap::NG::Common
perl -MCPAN -e shell
install Lemonldap::NG::Common
For more information on module installation, please visit the detailed CPAN module installation guide.