CVE-2020-36659 — Improper Certificate Validation in Apache
Severity
8.1HIGHNVD
OSV7.5
EPSS
0.3%
top 45.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 27
Description
In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages2 packages
▶debiandebian/libapache-session-browseable-perl< libapache-session-browseable-perl 1.3.7-1 (bookworm)
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2020-36659: libapache-session-browseable-perl - In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate i...↗2020