Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-6062

Опубликовано: 02 мар. 2017
Источник: nvd
CVSS3: 8.6
CVSS2: 5
EPSS Низкий

Описание

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:openidc:mod_auth_openidc:*:*:*:*:*:*:*:*
Версия до 2.1.4 (включая)

EPSS

Процентиль: 61%
0.00413
Низкий

8.6 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 8.6
ubuntu
почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 6.5
redhat
около 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
debian
почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka ...

CVSS3: 8.6
github
больше 3 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

EPSS

Процентиль: 61%
0.00413
Низкий

8.6 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-287