exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4762-1

Debian Security Advisory 4762-1
Posted Sep 28, 2020
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4762-1 - It was discovered that the default configuration files for running the Lemonldap::NG Web SSO system on the Nginx web server were susceptible to authorisation bypass of URL access rules. The Debian packages do not use Nginx by default.

tags | advisory, web
systems | linux, debian
advisories | CVE-2020-24660
SHA-256 | 1936fc20f1fce8c046e9a32b0cf72f8389efc42588b36d32567422da6ead95de

Debian Security Advisory 4762-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4762-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 07, 2020 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : lemonldap-ng
CVE ID : CVE-2020-24660

It was discovered that the default configuration files for running the
Lemonldap::NG Web SSO system on the Nginx web server were susceptible
to authorisation bypass of URL access rules. The Debian packages do not
use Nginx by default.

For the stable distribution (buster), this problem has been fixed in
version 2.0.2+ds-7+deb10u5, this update provides fixed example
configuration which needs to be integrated into Lemonldap::NG
deployments based on Nginx.

We recommend that you upgrade your lemonldap-ng packages.

For the detailed security status of lemonldap-ng please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lemonldap-ng

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=5Z18
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close