mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.
References
Configurations
History
07 Nov 2023, 03:37
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
24 Jul 2023, 13:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
First Time |
Debian
Debian debian Linux |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/07/msg00020.html - Mailing List | |
References | (CONFIRM) https://github.com/zmartzone/mod_auth_openidc/security/advisories/GHSA-2pgf-8h6h-gqg2 - Vendor Advisory |
19 Jul 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-09-03 14:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-39191
Mitre link : CVE-2021-39191
CVE.ORG link : CVE-2021-39191
JSON object : View
Products Affected
openidc
- mod_auth_openidc
fedoraproject
- fedora
debian
- debian_linux
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')