CPANSA-Apache-Session-Browseable-2020-36659: Apache-Session-Browseable vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2023-01-27T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2023-01-27T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 8.1 Severity
Original language Language en
Also referred to

Vulnerability Description

In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

Vulnerabilities

CVE-2020-36659

Vulnerability Description

In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.

Weakness CWE-295 : Improper Certificate Validation

Product status

Known affected
Product Score
Apache-Session-Browseable less than 1.3.6
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H 8.1 High
Fixed

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Fri Jan 27 00:00:00 2023 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/