Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-39191

Опубликовано: 03 сент. 2021
Источник: ubuntu
Приоритет: medium
CVSS2: 5.8
CVSS3: 4.7

Описание

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the target_link_uri parameter. A patch in version 2.4.9.4 made it so that the OIDCRedirectURLsAllowed setting must be applied to the target_link_uri parameter. There are no known workarounds aside from upgrading to a patched version.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

2.4.9.4-1
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

not-affected

2.4.9.4-1
esm-apps/noble

not-affected

2.4.9.4-1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
hirsute

ignored

end of life

Показывать по

5.8 Medium

CVSS2

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
почти 4 года назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.

CVSS3: 4.7
nvd
почти 4 года назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.

CVSS3: 4.7
debian
почти 4 года назад

mod_auth_openidc is an authentication/authorization module for the Apa ...

suse-cvrf
больше 2 лет назад

Security update for apache2-mod_auth_openidc

rocky
около 3 лет назад

Moderate: mod_auth_openidc:2.3 security update

5.8 Medium

CVSS2

4.7 Medium

CVSS3