CVE-2020-36659Improper Certificate Validation in Apache

Severity
8.1HIGHNVD
OSV7.5
EPSS
0.3%
top 45.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 27

Description

In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

debiandebian/libapache-session-browseable-perl< libapache-session-browseable-perl 1.3.7-1 (bookworm)
NVDlemonldap-ng/apache< 1.3.6

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-crqh-wr78-6jgr: In Apache::Session::Browseable before 12023-01-27
OSV
CVE-2020-36659: In Apache::Session::Browseable before 12023-01-27

📋Vendor Advisories

1
Debian
CVE-2020-36659: libapache-session-browseable-perl - In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate i...2020