Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-6062

Опубликовано: 30 янв. 2017
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7mod_auth_openidcNot affected
Red Hat Enterprise Linux 8mod_auth_openidcNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-290
https://bugzilla.redhat.com/show_bug.cgi?id=1425353mod_auth_openidc: OIDCUnAuthAction pass does not scrub request headers

EPSS

Процентиль: 61%
0.00413
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
nvd
почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
debian
почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka ...

CVSS3: 8.6
github
больше 3 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

EPSS

Процентиль: 61%
0.00413
Низкий

6.5 Medium

CVSS3