{"id":"CVE-2023-44469","details":"A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.","modified":"2026-04-10T05:03:09.171255Z","published":"2023-09-29T07:15:14.073Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00014.html"},{"type":"WEB","url":"https://security.lauritz-holtmann.de/post/sso-security-ssrf/"},{"type":"REPORT","url":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.17.1"},{"type":"FIX","url":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2998"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng","events":[{"introduced":"0"},{"fixed":"9140d6b229e77c04b588ab0b877f2e950dabd9a8"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.17.1"}]}}],"versions":["debian/bullseye","debian/buster","ubuntu/disco","ubuntu/focal","ubuntu/groovy","ubuntu/hirsute","ubuntu/jammy","v2.0.0","v2.0.1","v2.0.10","v2.0.11","v2.0.12","v2.0.13","v2.0.14","v2.0.15","v2.0.15.1","v2.0.16","v2.0.2","v2.0.3","v2.0.4","v2.0.6","v2.0.7","v2.0.8","v2.0.9","v2.17.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-44469.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}