Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-23527

Опубликовано: 14 дек. 2022
Источник: nvd
CVSS3: 4.7
CVSS3: 6.1
EPSS Низкий

Описание

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:openidc:mod_auth_openidc:*:*:*:*:*:*:*:*
Версия до 2.4.12.2 (исключая)
Конфигурация 2
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

EPSS

Процентиль: 55%
0.00332
Низкий

4.7 Medium

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-601
CWE-601

Связанные уязвимости

CVSS3: 4.7
ubuntu
больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 6.1
redhat
больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
debian
больше 2 лет назад

mod_auth_openidc is an OpenID Certified\u2122 authentication and autho ...

suse-cvrf
около 2 лет назад

Security update for apache2-mod_auth_openidc

suse-cvrf
больше 2 лет назад

Security update for apache2-mod_auth_openidc

EPSS

Процентиль: 55%
0.00332
Низкий

4.7 Medium

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-601
CWE-601