Логотип exploitDog
bind:CVE-2017-6413
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-6413

Количество 6

Количество 6

ubuntu логотип

CVE-2017-6413

почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2017-6413

почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2017-6413

почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2017-6413

почти 9 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka ...

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-9r74-cmm5-qv85

больше 3 лет назад

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
EPSS: Низкий
oracle-oval логотип

ELSA-2019-2112

больше 6 лет назад

ELSA-2019-2112: mod_auth_openidc security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-6413

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
0%
Низкий
почти 9 лет назад
redhat логотип
CVE-2017-6413

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 5.9
0%
Низкий
почти 9 лет назад
nvd логотип
CVE-2017-6413

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
0%
Низкий
почти 9 лет назад
debian логотип
CVE-2017-6413

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka ...

CVSS3: 8.6
0%
Низкий
почти 9 лет назад
github логотип
GHSA-9r74-cmm5-qv85

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS3: 8.6
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2019-2112

ELSA-2019-2112: mod_auth_openidc security update (MODERATE)

больше 6 лет назад

Уязвимостей на страницу