CVE-2019-15941

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass access control rules in LemonLDAP::NG's OpenID Connect Issuer by crafting malicious authorization requests. Attackers can exploit weaker access control rules in one OIDC Relaying Party to gain unauthorized access to another RP with stricter controls. Organizations using LemonLDAP::NG 2.x through 2.0.5 with OIDC configurations are affected.

💻 Affected Systems

Products:
  • LemonLDAP::NG
Versions: 2.x through 2.0.5
Operating Systems: All platforms running LemonLDAP::NG
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when OIDC Relaying Party configuration exists with weaker access control rules than target RP and no filtering on redirection URIs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete authentication bypass allowing unauthorized access to protected resources and sensitive data across all applications relying on LemonLDAP::NG for authentication.

🟠

Likely Case

Unauthorized access to specific applications or services that should be protected by stronger access controls, potentially leading to data exposure or privilege escalation.

🟢

If Mitigated

Limited impact with proper URI filtering and access control validation, potentially preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of OIDC configuration and access control rule differences between RPs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.6

Vendor Advisory: https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-6-is-out/

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Upgrade to LemonLDAP::NG 2.0.6 or later. 3. Restart LemonLDAP::NG services. 4. Verify configuration compatibility with new version.

🔧 Temporary Workarounds

Implement URI filtering

all

Add strict filtering on redirection URIs in OIDC configuration to prevent crafted requests.

Edit LemonLDAP::NG configuration to enforce strict URI validation for all OIDC Relaying Parties

Equalize access control rules

all

Ensure all OIDC Relaying Parties have consistent access control rules to eliminate rule differentials.

Review and standardize access control rules across all OIDC RPs in configuration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate LemonLDAP::NG instances from untrusted networks
  • Deploy WAF rules to detect and block suspicious OIDC authorization requests

🔍 How to Verify

Check if Vulnerable:

Check LemonLDAP::NG version and review OIDC configuration for multiple RPs with varying access control rules and lack of URI filtering.

Check Version:

lemonldap-ng-manager --version or check package manager (apt show lemonldap-ng, yum info lemonldap-ng)

Verify Fix Applied:

Verify version is 2.0.6 or later and test OIDC authorization flows to ensure access controls are properly enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unusual OIDC authorization requests
  • Access attempts bypassing expected authentication flows
  • Requests to unexpected redirection URIs

Network Indicators:

  • Suspicious OIDC authorization parameter manipulation
  • Requests attempting to chain different RP configurations

SIEM Query:

source="lemonldap-ng" AND (event="oidc_auth" AND (uri_contains="crafted" OR params_contains="bypass"))

🔗 References

📤 Share & Export