CVE-2023-28625

Severity
7.5HIGH
EPSS
0.1%
top 73.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Latest updateApr 11

Description

mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Debianlibapache2-mod-auth-openidc< 2.4.9.4-0+deb11u3+3
NVDopenidc/mod_auth_openidc2.0.02.4.13.2
CVEListV5openidc/mod_auth_openidc>= 2.0.0, < 2.4.13.2

Patches

🔴Vulnerability Details

2
CVEList
mod_auth_openidc core dump when OIDCStripCookies is set and an empty Cookie header is supplied2023-04-03
OSV
CVE-2023-28625: mod_auth_openidc is an authentication and authorization module for the Apache 22023-04-03

📋Vendor Advisories

3
Microsoft
mod_auth_openidc core dump when OIDCStripCookies is set and an empty Cookie header is supplied2023-04-11
Red Hat
mod_auth_openidc: NULL pointer dereference when OIDCStripCookies is set and a crafted Cookie header is supplied2023-04-03
Debian
CVE-2023-28625: libapache2-mod-auth-openidc - mod_auth_openidc is an authentication and authorization module for the Apache 2....2023
CVE-2023-28625 (HIGH CVSS 7.5) | mod_auth_openidc is an authenticati | cvebase.io