2024-05-25 21:48:12 +02:00
### [CVE-2020-15719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15719)



### Description
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
### POC
#### Reference
- https://kc.mcafee.com/corporate/index?page=content& id=SB10365
2024-06-09 00:33:16 +00:00
- https://kc.mcafee.com/corporate/index?page=content& id=SB10365
2024-05-25 21:48:12 +02:00
- https://www.oracle.com/security-alerts/cpuapr2022.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuapr2022.html
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/cyr3con-ai/cyRating-check-k8s-webhook
2024-06-07 04:52:01 +00:00
- https://github.com/testing-felickz/docker-scout-demo
2024-05-25 21:48:12 +02:00