Количество 14
Количество 14
CVE-2025-31492
mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, whi...
CVE-2025-31492
mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, whi...
CVE-2025-31492
mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, which
CVE-2025-31492
mod_auth_openidc is an OpenID Certified authentication and authorizati ...
SUSE-SU-2025:1465-1
Security update for apache2-mod_auth_openidc
SUSE-SU-2025:1337-1
Security update for apache2-mod_auth_openidc
SUSE-SU-2025:1324-1
Security update for apache2-mod_auth_openidc
SUSE-SU-2025:1286-1
Security update for apache2-mod_auth_openidc
RLSA-2025:7490
Important: mod_auth_openidc security update
ELSA-2025-7490
ELSA-2025-7490: mod_auth_openidc security update (IMPORTANT)
ELSA-2025-7419
ELSA-2025-7419: mod_auth_openidc security update (IMPORTANT)
ELSA-2025-3997
ELSA-2025-3997: mod_auth_openidc:2.3 security update (IMPORTANT)
BDU:2025-11077
Уязвимость модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию
ROS-20251022-01
Уязвимость mod_auth_openidc
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-31492 mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, whi... | 0% Низкий | 7 месяцев назад | ||
CVE-2025-31492 mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, whi... | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
CVE-2025-31492 mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, which | 0% Низкий | 7 месяцев назад | ||
CVE-2025-31492 mod_auth_openidc is an OpenID Certified authentication and authorizati ... | 0% Низкий | 7 месяцев назад | ||
SUSE-SU-2025:1465-1 Security update for apache2-mod_auth_openidc | 0% Низкий | 6 месяцев назад | ||
SUSE-SU-2025:1337-1 Security update for apache2-mod_auth_openidc | 0% Низкий | 7 месяцев назад | ||
SUSE-SU-2025:1324-1 Security update for apache2-mod_auth_openidc | 0% Низкий | 7 месяцев назад | ||
SUSE-SU-2025:1286-1 Security update for apache2-mod_auth_openidc | 0% Низкий | 7 месяцев назад | ||
RLSA-2025:7490 Important: mod_auth_openidc security update | 0% Низкий | около 1 месяца назад | ||
ELSA-2025-7490 ELSA-2025-7490: mod_auth_openidc security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-7419 ELSA-2025-7419: mod_auth_openidc security update (IMPORTANT) | 6 месяцев назад | |||
ELSA-2025-3997 ELSA-2025-3997: mod_auth_openidc:2.3 security update (IMPORTANT) | 7 месяцев назад | |||
BDU:2025-11077 Уязвимость модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
ROS-20251022-01 Уязвимость mod_auth_openidc | CVSS3: 7.5 | 0% Низкий | 12 дней назад |
Уязвимостей на страницу