CVE-2025-59518

8.0 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in LemonLDAP::NG's Safe jail feature. Administrators with rule editing privileges can execute arbitrary commands on the server due to improper localization of the underscore variable during rule evaluation. This affects systems running vulnerable versions of LemonLDAP::NG with administrators who can edit rules.

💻 Affected Systems

Products:
  • LemonLDAP::NG
Versions: Versions before 2.16.7, and versions 2.17 through 2.21 before 2.21.3
Operating Systems: All platforms running LemonLDAP::NG
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to edit rules that are evaluated by the Safe jail feature.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attacker to execute arbitrary commands with the privileges of the LemonLDAP::NG process, potentially leading to data theft, system takeover, or lateral movement.

🟠

Likely Case

Privileged administrator account compromise leading to unauthorized command execution, configuration changes, or data access within the LemonLDAP::NG environment.

🟢

If Mitigated

Limited impact due to restricted administrator access, proper network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM - While exploitation requires administrative access, internet-facing LemonLDAP::NG instances increase attack surface and potential for credential compromise.
🏢 Internal Only: HIGH - Internal administrators with rule editing privileges can exploit this vulnerability to gain command execution on the server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation is straightforward for administrators with rule editing privileges.

Exploitation requires administrative access to edit rules, making it an insider threat or post-compromise attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.16.7 or 2.21.3

Vendor Advisory: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/3462

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Update LemonLDAP::NG to version 2.16.7 (for 2.16.x branch) or 2.21.3 (for 2.17-2.21 branch). 3. Restart the LemonLDAP::NG service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit rule editing privileges to only essential administrators and implement strict access controls.

Disable Safe Jail Rule Editing

all

Temporarily disable or restrict access to rule editing functionality in the Safe jail if not required.

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for LemonLDAP::NG administrators
  • Monitor and audit all rule changes and administrator activities in LemonLDAP::NG

🔍 How to Verify

Check if Vulnerable:

Check LemonLDAP::NG version using the web interface or configuration files. Versions before 2.16.7 or between 2.17-2.21.2 are vulnerable.

Check Version:

Check the LemonLDAP::NG web interface or configuration files for version information. On Linux: grep 'version' /etc/lemonldap-ng/*.conf or check the web admin interface.

Verify Fix Applied:

Verify the installed version is 2.16.7 or higher, or 2.21.3 or higher for the 2.17-2.21 branch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual rule modifications in LemonLDAP::NG logs
  • Unexpected command execution patterns in system logs
  • Administrator account activity outside normal patterns

Network Indicators:

  • Unusual outbound connections from LemonLDAP::NG server
  • Unexpected network traffic patterns following rule changes

SIEM Query:

Search for: 'lemonldap rule modification' OR 'safe jail' AND 'command execution' in system and application logs

🔗 References

📤 Share & Export