CVE-2017-6413Improper Authentication in MOD Auth Openidc

Severity
8.6HIGHNVD
EPSS
0.4%
top 38.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 2
Latest updateMay 17

Description

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:NExploitability: 3.9 | Impact: 4.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9r74-cmm5-qv85: The "OpenID Connect Relying Party and OAuth 22022-05-17
CVEList
CVE-2017-6413: The "OpenID Connect Relying Party and OAuth 22017-03-02
OSV
CVE-2017-6413: The "OpenID Connect Relying Party and OAuth 22017-03-02

📋Vendor Advisories

2
Red Hat
mod_auth_openidc: OIDC_CLAIM and OIDCAuthNHeader not skipped in an "AuthType oauth20" configuration2017-02-20
Debian
CVE-2017-6413: libapache2-mod-auth-openidc - The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_o...2017

💬Community

2
Bugzilla
CVE-2017-6413 mod_auth_openidc: OIDC_CLAIM and OIDCAuthNHeader not skipped in an "AuthType oauth20" configuration2017-03-03
Bugzilla
CVE-2017-6059 CVE-2017-6062 CVE-2017-6413 mod_auth_openidc: various flaws [fedora-all]2017-02-21
CVE-2017-6413 — Improper Authentication | cvebase