CVE-2021-32785

Severity
7.5HIGH
EPSS
0.3%
top 50.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 22

Description

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

Debianlibapache2-mod-auth-openidc< 2.4.9-1+3
CVEListV5zmartzone/mod_auth_openidc< 2.4.9

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

2
CVEList
Format string bug in the Redis cache implementation2021-07-22
OSV
CVE-2021-32785: mod_auth_openidc is an authentication/authorization module for the Apache 22021-07-22

📋Vendor Advisories

3
Red Hat
mod_auth_openidc: format string bug in the Redis cache implementation2021-07-22
Microsoft
Format string bug in the Redis cache implementation2021-07-13
Debian
CVE-2021-32785: libapache2-mod-auth-openidc - mod_auth_openidc is an authentication/authorization module for the Apache 2.x HT...2021