CVE-2024-52947

NameCVE-2024-52947
DescriptionA cross-site scripting (XSS) vulnerability in LemonLDAP::NG before 2.20.1 allows remote attackers to inject arbitrary web script or HTML via the url parameter of the upgrade session confirmation page (upgradeSession / forceUpgrade) if the "Upgrade session" plugin has been enabled by an admin
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3979-1, ELA-1263-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lemonldap-ng (PTS)jessie, jessie (lts)1.3.3-1+deb8u2vulnerable
stretch (security), stretch (lts), stretch1.9.7-3+deb9u4vulnerable
buster, buster (lts)2.0.2+ds-7+deb10u11fixed
buster (security)2.0.2+ds-7+deb10u10vulnerable
bullseye2.0.11+ds-4+deb11u5vulnerable
bullseye (security)2.0.11+ds-4+deb11u6fixed
bookworm2.16.1+ds-deb12u3vulnerable
sid, trixie2.20.1+ds-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lemonldap-ngsourcejessie(unfixed)end-of-life
lemonldap-ngsourcestretch(unfixed)end-of-life
lemonldap-ngsourcebuster2.0.2+ds-7+deb10u11ELA-1263-1
lemonldap-ngsourcebullseye2.0.11+ds-4+deb11u6DLA-3979-1
lemonldap-ngsource(unstable)2.20.1+ds-1

Notes

[bookworm] - lemonldap-ng <no-dsa> (Minor issue, will be fixed via spu)
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3257
Fixed by: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/600ba2c0b3d4bb0a4dd2eb9d8b612edcca8805dc (v2.20.1)

Search for package or bug name: Reporting problems