Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-23527

Опубликовано: 14 дек. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 4.7

Описание

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2.4.12.3-1
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

not-affected

2.4.12.3-1
esm-apps/xenial

not-affected

code not present
focal

ignored

end of standard support, was needed
jammy

needed

kinetic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 55%
0.00332
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
nvd
больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
debian
больше 2 лет назад

mod_auth_openidc is an OpenID Certified\u2122 authentication and autho ...

suse-cvrf
около 2 лет назад

Security update for apache2-mod_auth_openidc

suse-cvrf
больше 2 лет назад

Security update for apache2-mod_auth_openidc

EPSS

Процентиль: 55%
0.00332
Низкий

4.7 Medium

CVSS3