CVE-2017-6062Improper Authentication in MOD Auth Openidc

Severity
8.6HIGHNVD
EPSS
0.4%
top 38.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 2
Latest updateMay 13

Description

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:NExploitability: 3.9 | Impact: 4.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5fhw-rc3x-vmxm: The "OpenID Connect Relying Party and OAuth 22022-05-13
OSV
CVE-2017-6062: The "OpenID Connect Relying Party and OAuth 22017-03-02
CVEList
CVE-2017-6062: The "OpenID Connect Relying Party and OAuth 22017-03-02

📋Vendor Advisories

2
Red Hat
mod_auth_openidc: OIDCUnAuthAction pass does not scrub request headers2017-01-30
Debian
CVE-2017-6062: libapache2-mod-auth-openidc - The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_o...2017

💬Community

3
Bugzilla
qt5-qtwebengine: 16 security vulnerabilities2018-03-24
Bugzilla
CVE-2017-6059 CVE-2017-6062 CVE-2017-6413 mod_auth_openidc: various flaws [fedora-all]2017-02-21
Bugzilla
CVE-2017-6062 mod_auth_openidc: OIDCUnAuthAction pass does not scrub request headers2017-02-21
CVE-2017-6062 — Improper Authentication | cvebase