Vulnerability Details : CVE-2022-37186
In LemonLDAP::NG before 2.0.15. some sessions are not deleted when they are supposed to be deleted according to the timeoutActivity setting. This can occur when there are at least two servers, and a session is manually removed before the time at which it would have been removed automatically.
Products affected by CVE-2022-37186
- cpe:2.3:a:lemonldap-ng:lemonldap\:\:ng:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-37186
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-37186
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2022-37186
-
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-37186
-
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/59c781b393947663ad3bf26bad0581413dd6fae4
Improve session destroy propagation (#2758) (59c781b3) · Commits · LemonLDAP NG / lemonldap-ng · GitLabPatch
-
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.0.15
v2.0.15 · LemonLDAP NG / lemonldap-ng · GitLabPatch;Release Notes
-
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2758
[CVE-2022-37186] Session destroyed on portal but still valid on handlers while there is activity (#2758) · Issues · LemonLDAP NG / lemonldap-ng · GitLabExploit;Issue Tracking;Patch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2023/01/msg00027.html
[SECURITY] [DLA 3287-1] lemonldap-ng security updateMailing List;Third Party Advisory
Jump to