The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade RHEL:8
mod_auth_openidc:2.3/cjose-devel
to version 0:0.6.1-4.module+el8.9.0+19469+5b493da9 or higher.
This issue was patched in RHSA-2023:6940
.
Note: Versions mentioned in the description apply only to the upstream mod_auth_openidc:2.3/cjose-devel
package and not the mod_auth_openidc:2.3/cjose-devel
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.