CVE-2024-24814

Severity
7.5HIGH
EPSS
0.2%
top 57.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 13

Description

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very larg

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Debianlibapache2-mod-auth-openidc< 2.4.9.4-0+deb11u4+3
NVDopenidc/mod_auth_openidc2.0.02.4.15.1
CVEListV5openidc/mod_auth_openidc>= 2.0.0, < 2.4.15.2

Also affects: Debian Linux 10.0, Fedora 39

Patches

🔴Vulnerability Details

2
CVEList
Denial of service when manipulating mod_auth_openidc_session_chunks cookie in mod_auth_openidc2024-02-13
OSV
CVE-2024-24814: mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 22024-02-13

📋Vendor Advisories

2
Red Hat
mod_auth_openidc: DoS when using `OIDCSessionType client-cookie` and manipulating cookies2024-02-13
Debian
CVE-2024-24814: libapache2-mod-auth-openidc - mod_auth_openidc is an OpenID Certified™ authentication and authorization module...2024
CVE-2024-24814 (HIGH CVSS 7.5) | mod_auth_openidc is an OpenID Certi | cvebase.io