CVE-2019-12046

9.8 CRITICAL

📋 TL;DR

CVE-2019-12046 is an incorrect access control vulnerability in LemonLDAP::NG 2.0.3 that allows attackers to bypass authentication and authorization mechanisms. This affects systems using LemonLDAP::NG for single sign-on and web access management, potentially exposing protected applications and data.

💻 Affected Systems

Products:
  • LemonLDAP::NG
Versions: 2.0.3
Operating Systems: All platforms running LemonLDAP::NG
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using LemonLDAP::NG 2.0.3 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all applications protected by LemonLDAP::NG, allowing unauthorized access to sensitive data and administrative functions across the entire SSO infrastructure.

🟠

Likely Case

Unauthorized access to protected applications and data, potentially leading to data breaches, privilege escalation, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and additional authentication layers, though core SSO functionality remains compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the core access control logic, making exploitation straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.4 and later

Vendor Advisory: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1742

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download LemonLDAP::NG 2.0.4 or later from https://lemonldap-ng.org/download. 3. Follow upgrade instructions in the documentation. 4. Restart LemonLDAP::NG services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict access to LemonLDAP::NG instances to trusted networks only

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement additional authentication layer (e.g., VPN, client certificates) before LemonLDAP::NG
  • Monitor all authentication attempts and access logs for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check LemonLDAP::NG version: grep 'version' /etc/lemonldap-ng/lemonldap-ng.ini or check package manager

Check Version:

perl -MLemonldap::NG::Common -e 'print $Lemonldap::NG::Common::VERSION'

Verify Fix Applied:

Verify version is 2.0.4 or later and test authentication/authorization functionality

📡 Detection & Monitoring

Log Indicators:

  • Unexpected successful authentications
  • Access from unusual IP addresses
  • Authentication bypass patterns in access logs

Network Indicators:

  • Unusual authentication traffic patterns
  • Access to protected resources without proper authentication flow

SIEM Query:

source="lemonldap-ng.log" (event="authentication_success" AND src_ip NOT IN [trusted_ips]) OR (event="authorization_bypass")

🔗 References

📤 Share & Export