Open Redirect Affecting mod_auth_openidc package, versions <0:2.4.9.4-4.el9


Severity

Recommended
0.0
medium
0
10

Based on AlmaLinux security rating

    Threat Intelligence

    EPSS
    0.1% (44th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-ALMALINUX9-MODAUTHOPENIDC-6061516
  • published 15 Nov 2023
  • disclosed 7 Nov 2023

How to fix?

Upgrade AlmaLinux:9 mod_auth_openidc to version 0:2.4.9.4-4.el9 or higher.
This issue was patched in ALSA-2023:6365.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mod_auth_openidc package and not the mod_auth_openidc package as distributed by AlmaLinux. See How to fix? for AlmaLinux:9 relevant fixed versions and status.

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.

CVSS Scores

version 3.1
Expand this section

NVD

6.1 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Required
  • Scope (S)
    Changed
  • Confidentiality (C)
    Low
  • Integrity (I)
    Low
  • Availability (A)
    None
Expand this section

SUSE

5.4 medium
Expand this section

Red Hat

6.1 medium