LemonLDAP::NG before 1.2.3 does not use the signature-verification capability of the Lasso library, which allows remote attackers to bypass intended access-control restrictions via crafted SAML data.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 28 May 2025 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:lemonldap-ng:lemonldap\:\::0.8.1:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::0.8.2:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::0.8.3:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::0.9.1:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::0.9.2:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::0.9.3:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::0.9.4:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.0.1:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.0.2:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.0.3:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.0.4:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.0.5:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.0.6:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.1.0:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.1.1:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.1.2:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.2.0:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\::1.2.1:*:*:*:*:*:*:* | cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:*:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:0.8.1:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:0.8.2:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:0.8.3:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:0.9.1:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:0.9.2:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.0.3:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.0.4:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.0.5:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.0.6:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.1.0:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.1.1:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.1.2:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:1.2.1:*:*:*:*:*:*:* | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2013-01-01T15:00:00Z
Updated: 2024-09-16T19:41:54.777Z
Reserved: 2012-12-18T00:00:00Z
Link: CVE-2012-6426
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Deferred
Published: 2013-01-01T15:55:02.493
Modified: 2025-05-28T17:23:02.190
Link: CVE-2012-6426
 Redhat
                        Redhat
                    No data.