CVE-2020-36658Improper Certificate Validation in Apache

Severity
8.1HIGHNVD
OSV7.5
EPSS
0.2%
top 60.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 27
Latest updateJan 24

Description

In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

debiandebian/libapache-session-ldap-perl< libapache-session-ldap-perl 0.5-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-qf7m-fmfh-9c8v: In Apache::Session::LDAP before 02023-01-27
OSV
CVE-2020-36658: In Apache::Session::LDAP before 02023-01-27

📋Vendor Advisories

2
Ubuntu
Apache::Session::LDAP vulnerability2024-01-24
Debian
CVE-2020-36658: libapache-session-ldap-perl - In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not ch...2020