{"id":"CVE-2023-28862","details":"An issue was discovered in LemonLDAP::NG before 2.16.1. Weak session ID generation in the AuthBasic handler and incorrect failure handling during a password check allow attackers to bypass 2FA verification. Any plugin that tries to deny session creation after the store step does not deny an AuthBasic session.","modified":"2026-04-10T04:57:01.959520Z","published":"2023-03-31T17:15:06.620Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00018.html"},{"type":"ADVISORY","url":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.16.1"},{"type":"FIX","url":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2896"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng","events":[{"introduced":"0"},{"fixed":"8a6a69dd7d8f3f1917a6f7faa6a42fbc4fc78165"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.16.1"}]}}],"versions":["debian/bullseye","debian/buster","ubuntu/disco","ubuntu/focal","ubuntu/groovy","ubuntu/hirsute","ubuntu/jammy","v2.0.0","v2.0.1","v2.0.10","v2.0.11","v2.0.12","v2.0.13","v2.0.14","v2.0.15","v2.0.15.1","v2.0.2","v2.0.3","v2.0.4","v2.0.6","v2.0.7","v2.0.8","v2.0.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28862.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}