First published: Mon Feb 01 2016(Updated: )
examples/consumer/common.php in JanRain PHP OpenID library (aka php-openid) improperly checks the openid.realm parameter against the SERVER_NAME element in the SERVER superglobal array, which might allow remote attackers to hijack the authentication of arbitrary users via vectors involving a crafted HTTP Host header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Janrain PHP-OpenID |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-2049 is considered moderate due to its potential impact on user authentication.
To fix CVE-2016-2049, ensure that the openid.realm parameter is properly validated against a safe list of allowed values instead of relying on the SERVER_NAME.
CVE-2016-2049 affects JanRain PHP OpenID library, also known as php-openid.
Yes, CVE-2016-2049 can allow remote attackers to hijack user authentication if exploited.
A possible workaround for CVE-2016-2049 is to implement additional checks and secure configurations for the openid.realm parameter.