Логотип exploitDog
bind:"CVE-2022-23527"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-23527"

Количество 8

Количество 8

ubuntu логотип

CVE-2022-23527

больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2022-23527

больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2022-23527

больше 2 лет назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2022-23527

больше 2 лет назад

mod_auth_openidc is an OpenID Certified\u2122 authentication and autho ...

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1837-1

около 2 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0215-1

больше 2 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6940

больше 1 года назад

ELSA-2023-6940: mod_auth_openidc:2.3 security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6365

больше 1 года назад

ELSA-2023-6365: mod_auth_openidc security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-23527

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-23527

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-23527

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS3: 4.7
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-23527

mod_auth_openidc is an OpenID Certified\u2122 authentication and autho ...

CVSS3: 4.7
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1837-1

Security update for apache2-mod_auth_openidc

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0215-1

Security update for apache2-mod_auth_openidc

больше 2 лет назад
oracle-oval логотип
ELSA-2023-6940

ELSA-2023-6940: mod_auth_openidc:2.3 security and bug fix update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2023-6365

ELSA-2023-6365: mod_auth_openidc security and bug fix update (MODERATE)

больше 1 года назад

Уязвимостей на страницу