In Apache::Session::LDAP before 0.5, validity of the X...
High severity
Unreviewed
Published
Jan 27, 2023
to the GitHub Advisory Database
•
Updated Feb 14, 2023
Description
Published by the National Vulnerability Database
Jan 27, 2023
Published to the GitHub Advisory Database
Jan 27, 2023
Last updated
Feb 14, 2023
In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
References