CVE-2020-16093 — Improper Certificate Validation in Apache
Severity
8.1HIGHNVD
NVD7.5OSV7.5
EPSS
0.4%
top 36.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 18
Latest updateJan 27
Description
In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages5 packages
▶debiandebian/libapache-session-browseable-perl< libapache-session-browseable-perl 1.3.7-1 (bookworm)
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
6📋Vendor Advisories
3Debian▶
CVE-2020-16093: lemonldap-ng - In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certifi...↗2020
Debian▶
CVE-2020-36659: libapache-session-browseable-perl - In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate i...↗2020
Debian▶
CVE-2020-36658: libapache-session-ldap-perl - In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not ch...↗2020