Vulnerability Description
The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openidc | Mod Auth Openidc | <= 2.1.5 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96549
- https://access.redhat.com/errata/RHSA-2019:2112
- https://github.com/pingidentity/mod_auth_openidc/blob/master/ChangeLogIssue TrackingPatchThird Party Advisory
- https://github.com/pingidentity/mod_auth_openidc/commit/21e3728a825c41ab41efa75eIssue TrackingPatchThird Party Advisory
- https://github.com/pingidentity/mod_auth_openidc/releases/tag/v2.1.6PatchRelease NotesThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- http://www.securityfocus.com/bid/96549
- https://access.redhat.com/errata/RHSA-2019:2112
- https://github.com/pingidentity/mod_auth_openidc/blob/master/ChangeLogIssue TrackingPatchThird Party Advisory
- https://github.com/pingidentity/mod_auth_openidc/commit/21e3728a825c41ab41efa75eIssue TrackingPatchThird Party Advisory
- https://github.com/pingidentity/mod_auth_openidc/releases/tag/v2.1.6PatchRelease NotesThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2017-6413?
CVE-2017-6413 is a vulnerability with a CVSS score of 8.6 (HIGH). The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "Auth...
How severe is CVE-2017-6413?
CVE-2017-6413 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6413?
Check the references section above for vendor advisories and patch information. Affected products include: Openidc Mod Auth Openidc.