Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0215-1

Опубликовано: 30 янв. 2023
Источник: suse-cvrf

Описание

Security update for apache2-mod_auth_openidc

This update for apache2-mod_auth_openidc fixes the following issues:

  • CVE-2022-23527: Fixed open redirect in oidc_validate_redirect_url() using tab character (bsc#1206441).
  • CVE-2021-39191: Fixed open redirect issue in target_link_uri parameter (bsc#1190223).

Список пакетов

SUSE Linux Enterprise Module for Server Applications 15 SP4
apache2-mod_auth_openidc-2.3.8-150100.3.22.1
SUSE Linux Enterprise Real Time 15 SP3
apache2-mod_auth_openidc-2.3.8-150100.3.22.1
openSUSE Leap 15.4
apache2-mod_auth_openidc-2.3.8-150100.3.22.1

Описание

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.


Затронутые продукты
SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-mod_auth_openidc-2.3.8-150100.3.22.1
SUSE Linux Enterprise Real Time 15 SP3:apache2-mod_auth_openidc-2.3.8-150100.3.22.1
openSUSE Leap 15.4:apache2-mod_auth_openidc-2.3.8-150100.3.22.1

Ссылки

Описание

mod_auth_openidc is an OpenID Certified(tm) authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.


Затронутые продукты
SUSE Linux Enterprise Module for Server Applications 15 SP4:apache2-mod_auth_openidc-2.3.8-150100.3.22.1
SUSE Linux Enterprise Real Time 15 SP3:apache2-mod_auth_openidc-2.3.8-150100.3.22.1
openSUSE Leap 15.4:apache2-mod_auth_openidc-2.3.8-150100.3.22.1

Ссылки