{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T15:45:04.504","vulnerabilities":[{"cve":{"id":"CVE-2020-15259","sourceIdentifier":"security-advisories@github.com","published":"2020-11-06T20:15:11.850","lastModified":"2024-11-21T05:05:12.893","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ad-ldap-connector's admin panel before version 5.0.13 does not provide csrf protection, which when exploited may result in remote code execution or confidential data loss. CSRF exploits may occur if the user visits a malicious page containing CSRF payload on the same machine that has access to the ad-ldap-connector admin console via a browser. You may be affected if you use the admin console included with ad-ldap-connector versions <=5.0.12. If you do not have ad-ldap-connector admin console enabled or do not visit any other public URL while on the machine it is installed on, you are not affected. The issue is fixed in version 5.0.13."},{"lang":"es","value":"El panel de administración de ad-ldap-connector versiones anteriores a 5.0.13, no proporciona una protección csrf, que cuando es explotada puede resultar en una ejecución de código remota o una pérdida de datos confidenciales.&#xa0;Las explotaciones de CSRF pueden ocurrir si el usuario visita una página maliciosa que contiene la carga útil CSRF en la misma máquina que tiene acceso a la consola de administración del ad-ldap-connector por medio de un navegador.&#xa0;Puede estar afectado si utiliza la consola de administración incluida con ad-ldap-connector versiones anteriores a 5.0.12 e incluyéndola.&#xa0;Si no tiene habilitada la consola de administración o no visita ninguna otra URL pública mientras está en la máquina en la que está instalada, no está afectada.&#xa0;El problema es corregido en la versión 5.0.13"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:auth0:ad\\/ldap_connector:*:*:*:*:*:node.js:*:*","versionEndExcluding":"5.0.13","matchCriteriaId":"AC9881C9-69C4-4E61-AE94-33E50BCA597D"}]}]}],"references":[{"url":"https://github.com/auth0/ad-ldap-connector/commit/8b793631ec5ecacf63ff3ece23231a9e138ae911","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/auth0/ad-ldap-connector/security/advisories/GHSA-vx5q-cp9v-427v","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/auth0/ad-ldap-connector/commit/8b793631ec5ecacf63ff3ece23231a9e138ae911","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/auth0/ad-ldap-connector/security/advisories/GHSA-vx5q-cp9v-427v","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}