Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-23527

Опубликовано: 14 дек. 2022
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

An open redirect vulnerability was found in mod_auth_openidc, an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect.

Меры по смягчению последствий

This vulnerability can mitigated by configuring mod_auth_openidc to only allow redirection whose destination matches a given regular expression with OIDCRedirectURLsAllowed.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7mod_auth_openidcOut of support scope
Red Hat Enterprise Linux 8mod_auth_openidcFixedRHSA-2023:694014.11.2023
Red Hat Enterprise Linux 9mod_auth_openidcFixedRHSA-2023:636507.11.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2153655mod_auth_openidc: Open Redirect in oidc_validate_redirect_url() using tab character

EPSS

Процентиль: 55%
0.00332
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
ubuntu
больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
nvd
больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
debian
больше 2 лет назад

mod_auth_openidc is an OpenID Certified\u2122 authentication and autho ...

suse-cvrf
около 2 лет назад

Security update for apache2-mod_auth_openidc

suse-cvrf
больше 2 лет назад

Security update for apache2-mod_auth_openidc

EPSS

Процентиль: 55%
0.00332
Низкий

6.1 Medium

CVSS3