Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-6413

Опубликовано: 20 фев. 2017
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

It was found that mod_auth_openidc did not properly sanitize HTTP headers for certain request paths. A remote attacker could potentially use this flaw to bypass authentication and access sensitive information by sending crafted HTTP requests.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8mod_auth_openidcNot affected
Red Hat Enterprise Linux 7mod_auth_openidcFixedRHSA-2019:211206.08.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1428855mod_auth_openidc: OIDC_CLAIM and OIDCAuthNHeader not skipped in an "AuthType oauth20" configuration

EPSS

Процентиль: 61%
0.00408
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
nvd
почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
debian
почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka ...

CVSS3: 8.6
github
больше 3 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

oracle-oval
больше 6 лет назад

ELSA-2019-2112: mod_auth_openidc security update (MODERATE)

EPSS

Процентиль: 61%
0.00408
Низкий

5.9 Medium

CVSS3