Логотип exploitDog
bind:"CVE-2025-31492"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-31492"

Количество 14

Количество 14

ubuntu логотип

CVE-2025-31492

7 месяцев назад

mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, whi...

EPSS: Низкий
redhat логотип

CVE-2025-31492

7 месяцев назад

mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, whi...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-31492

7 месяцев назад

mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, which

EPSS: Низкий
debian логотип

CVE-2025-31492

7 месяцев назад

mod_auth_openidc is an OpenID Certified authentication and authorizati ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1465-1

6 месяцев назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1337-1

7 месяцев назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1324-1

7 месяцев назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1286-1

7 месяцев назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
rocky логотип

RLSA-2025:7490

около 1 месяца назад

Important: mod_auth_openidc security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7490

4 месяца назад

ELSA-2025-7490: mod_auth_openidc security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7419

6 месяцев назад

ELSA-2025-7419: mod_auth_openidc security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-3997

7 месяцев назад

ELSA-2025-3997: mod_auth_openidc:2.3 security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-11077

7 месяцев назад

Уязвимость модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20251022-01

12 дней назад

Уязвимость mod_auth_openidc

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-31492

mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, whi...

0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-31492

mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, whi...

CVSS3: 7.5
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-31492

mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, which

0%
Низкий
7 месяцев назад
debian логотип
CVE-2025-31492

mod_auth_openidc is an OpenID Certified authentication and authorizati ...

0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1465-1

Security update for apache2-mod_auth_openidc

0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1337-1

Security update for apache2-mod_auth_openidc

0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1324-1

Security update for apache2-mod_auth_openidc

0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1286-1

Security update for apache2-mod_auth_openidc

0%
Низкий
7 месяцев назад
rocky логотип
RLSA-2025:7490

Important: mod_auth_openidc security update

0%
Низкий
около 1 месяца назад
oracle-oval логотип
ELSA-2025-7490

ELSA-2025-7490: mod_auth_openidc security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-7419

ELSA-2025-7419: mod_auth_openidc security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-3997

ELSA-2025-3997: mod_auth_openidc:2.3 security update (IMPORTANT)

7 месяцев назад
fstec логотип
BDU:2025-11077

Уязвимость модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
0%
Низкий
7 месяцев назад
redos логотип
ROS-20251022-01

Уязвимость mod_auth_openidc

CVSS3: 7.5
0%
Низкий
12 дней назад

Уязвимостей на страницу