mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.
References
Configurations
History
21 Jul 2023, 19:25
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/zmartzone/mod_auth_openidc/blob/v2.4.12.1/auth_openidc.conf#L975-L984 - Product | |
References | (MISC) https://github.com/zmartzone/mod_auth_openidc/security/advisories/GHSA-q6f2-285m-gr53 - Vendor Advisory | |
References | (MISC) https://lists.debian.org/debian-lts-announce/2023/07/msg00020.html - Mailing List | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
First Time |
Debian
Debian debian Linux |
19 Jul 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-12-14 18:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-23527
Mitre link : CVE-2022-23527
CVE.ORG link : CVE-2022-23527
JSON object : View
Products Affected
debian
- debian_linux
openidc
- mod_auth_openidc
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')