{"api_version":"1","generated_at":"2026-04-23T06:30:56+00:00","cve":"CVE-2019-15941","urls":{"html":"https://cve.report/CVE-2019-15941","api":"https://cve.report/api/cve/CVE-2019-15941.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-15941","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-15941"},"summary":{"title":"CVE-2019-15941","description":"OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-09-25 20:15:00","updated_at":"2020-08-18 15:05:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-6-is-out/","name":"https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-6-is-out/","refsource":"MISC","tags":["Third Party Advisory"],"title":"OW2 - lemonldap-ng.lemonldap-ng-2-0-6-is-out - LemonLDAP::NG 2.0.6 is out!","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1881","name":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1881","refsource":"MISC","tags":["Third Party Advisory"],"title":"[Security:high] oidc authorization codes are not tied to their RP (#1881) · Issues · LemonLDAP NG / lemonldap-ng · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://seclists.org/bugtraq/2019/Sep/46","name":"20190926 [SECURITY] [DSA 4533-1] lemonldap-ng security update","refsource":"BUGTRAQ","tags":["Mailing List","Third Party Advisory"],"title":"Bugtraq: [SECURITY] [DSA 4533-1] lemonldap-ng security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2019/dsa-4533","name":"DSA-4533","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-4533-1 lemonldap-ng","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-15941","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15941","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"15941","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"15941","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"15941","vulnerable":"1","versionEndIncluding":"2.0.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lemonldap-ng","cpe5":"lemonldap","cpe6":"","cpe7":"","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"15941","vulnerable":"1","versionEndIncluding":"2.0.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lemonldap-ng","cpe5":"lemonldap\\","cpe6":"\\","cpe7":"","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-15941","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1881","refsource":"MISC","name":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1881"},{"refsource":"MISC","name":"https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-6-is-out/","url":"https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-6-is-out/"},{"refsource":"DEBIAN","name":"DSA-4533","url":"https://www.debian.org/security/2019/dsa-4533"},{"refsource":"BUGTRAQ","name":"20190926 [SECURITY] [DSA 4533-1] lemonldap-ng security update","url":"https://seclists.org/bugtraq/2019/Sep/46"}]}},"nvd":{"publishedDate":"2019-09-25 20:15:00","lastModifiedDate":"2020-08-18 15:05:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:lemonldap-ng:lemonldap\\:\\::*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndIncluding":"2.0.5","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"15941","Ordinal":"155510","Title":"CVE-2019-15941","CVE":"CVE-2019-15941","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"15941","Ordinal":"1","NoteData":"OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"15941","Ordinal":"2","NoteData":"2019-09-25","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"15941","Ordinal":"3","NoteData":"2019-09-26","Type":"Other","Title":"Modified"}]}}}