Логотип exploitDog
bind:"CVE-2021-32786" OR bind:"CVE-2021-32791" OR bind:"CVE-2021-32792" OR bind:"CVE-2021-39191"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-32786" OR bind:"CVE-2021-32791" OR bind:"CVE-2021-32792" OR bind:"CVE-2021-39191"

Количество 31

Количество 31

rocky логотип

RLSA-2022:1823

почти 4 года назад

Moderate: mod_auth_openidc:2.3 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1823

больше 3 лет назад

ELSA-2022-1823: mod_auth_openidc:2.3 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3352-1

больше 4 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4532-1

около 1 месяца назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3020-1

больше 4 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1277-1

больше 4 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3020-1

больше 4 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
ubuntu логотип

CVE-2021-32786

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2021-32786

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2021-32786

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.

CVSS3: 4.7
EPSS: Низкий
msrc логотип

CVE-2021-32786

около 4 лет назад

Open Redirect in oidc_validate_redirect_url()

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2021-32786

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apa ...

CVSS3: 4.7
EPSS: Низкий
fstec логотип

BDU:2022-01677

около 9 лет назад

Уязвимость функции oidc_validate_redirect_url() модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2021-32791

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2021-32791

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2021-32791

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2021-32791

около 4 лет назад

Hardcoded static IV and AAD with a reused key in AES GCM encryption in mod_auth_openidc

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2021-32791

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apa ...

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2022-01657

больше 4 лет назад

Уязвимость функционала шифрования AES GCM модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2021-39191

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2022:1823

Moderate: mod_auth_openidc:2.3 security update

почти 4 года назад
oracle-oval логотип
ELSA-2022-1823

ELSA-2022-1823: mod_auth_openidc:2.3 security update (MODERATE)

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:3352-1

Security update for apache2-mod_auth_openidc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2025:4532-1

Security update for apache2-mod_auth_openidc

около 1 месяца назад
suse-cvrf логотип
openSUSE-SU-2021:3020-1

Security update for apache2-mod_auth_openidc

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1277-1

Security update for apache2-mod_auth_openidc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3020-1

Security update for apache2-mod_auth_openidc

больше 4 лет назад
ubuntu логотип
CVE-2021-32786

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.

CVSS3: 4.7
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-32786

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.

CVSS3: 6.1
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-32786

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.

CVSS3: 4.7
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-32786

Open Redirect in oidc_validate_redirect_url()

CVSS3: 6.1
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-32786

mod_auth_openidc is an authentication/authorization module for the Apa ...

CVSS3: 4.7
0%
Низкий
больше 4 лет назад
fstec логотип
BDU:2022-01677

Уязвимость функции oidc_validate_redirect_url() модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 6.1
0%
Низкий
около 9 лет назад
ubuntu логотип
CVE-2021-32791

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-32791

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-32791

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-32791

Hardcoded static IV and AAD with a reused key in AES GCM encryption in mod_auth_openidc

CVSS3: 5.9
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-32791

mod_auth_openidc is an authentication/authorization module for the Apa ...

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
fstec логотип
BDU:2022-01657

Уязвимость функционала шифрования AES GCM модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2021-39191

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.

CVSS3: 4.7
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу