In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3284-1 | libapache-session-ldap-perl security update |
![]() |
EUVD-2020-24104 | In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix. |
![]() |
USN-6596-1 | Apache::Session::LDAP vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 28 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-28T17:37:05.065Z
Reserved: 2023-01-27T00:00:00.000Z
Link: CVE-2020-36658

Updated: 2024-08-04T17:30:08.508Z

Status : Modified
Published: 2023-01-27T05:15:12.973
Modified: 2025-03-28T18:15:15.120
Link: CVE-2020-36658

No data.

No data.