drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in lemonldap-ng
| Name: |
Cross-Site Scripting in lemonldap-ng |
|
| ID: |
DSA-5897-1 |
|
| Distribution: |
Debian |
|
| Plattformen: |
Debian bookworm |
|
| Datum: |
Di, 8. April 2025, 22:22 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2025-31510 |
|
| Applikationen: |
LemonLDAP::NG |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5897-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff April 08, 2025 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : lemonldap-ng CVE ID : CVE-2025-31510
A cross-site scripting vulnerability has been discovered in Lemonldap::NG, a Web-SSO system compatible with OpenID-Connect, CAS and SAML, when using the "Choice" module: It permits to introduce HTML code into the login page and if the default Content-Security-Policy headers have been modified, it may be possible to inject JavaScript code.
For the stable distribution (bookworm), this problem has been fixed in version 2.16.1+ds-deb12u6.
We recommend that you upgrade your lemonldap-ng packages.
For the detailed security status of lemonldap-ng please refer to its security tracker page at: https://security-tracker.debian.org/tracker/lemonldap-ng
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmf1VScACgkQEMKTtsN8 TjYPjw/9HrwQzMz9+QbK+V56JSlfoOT3Ccg5tVPlmKkHKd4wsC8nDmQ2F2gPbXaK zyI0ZKW8sggMt81P30aBGs7AY6lhkXb5tSbQK/4i1EimGDOh1+mCUt99AmJRkrR/ J9Gik4eHFtJAB7oI2fGkDCS7cU+QfhuOGnK4J/YK6b3TJkr0teLxP1U6aWfzG0vF C0sezXHIfJopY6QFOzHAgE7koVCK4WV5Jsa4VZ3SjBk9pFFNuHGeRfjUyOHiNYbs IPvT/YdjfEEWUrTbla9bsWu2UQ6fQVM+Iua+72FOrYSwqvW++RQjADlBU9QVekRy eFCXK22p9ICbp6mnNydnjL6gHsrmQo1PKFd771gfwm34zspHkTytgHdV1m++xmhh 1WAperBFOi86/CKedJL8mgzUm8/MevQ4JRSN03go/WLsVg6BXXO1R7TeTB2LYK/x AHcQteiFqrMoDzxIfyEJ54zxYj9FX3QpK2N2jJgVQBkDriAoWHjFkko11mNqJyjv azqgxw6dyVQRtKG4NaGsA7my9W81PFY+4Qsg4Ma0xqnuDq4vATSnidyM44aHCedU yJOQO8Uj8cQ3siOhPwI+vnp+olI0oA4Qbc0tx4/FbdzAiv0kyMjCdUdD3bSmnokf UBpGzX1LDlI7OJIRPc8RN9LDv/uhQoaFtF0IN5U/c7Htlh23p/Q= =hJfd -----END PGP SIGNATURE-----
|
|
|
|