First published: Tue Feb 21 2017(Updated: )
It was found that the OpenID Connect authentication module for Apache is vulnerable to Content Spoofing due to the user-supplied content being shown in the error pages. Upstream bug: <a href="https://github.com/pingidentity/mod_auth_openidc/issues/212">https://github.com/pingidentity/mod_auth_openidc/issues/212</a> Upstream patch: <a href="https://github.com/pingidentity/mod_auth_openidc/commit/612e309bfffd6f9b8ad7cdccda3019fc0865f3b4">https://github.com/pingidentity/mod_auth_openidc/commit/612e309bfffd6f9b8ad7cdccda3019fc0865f3b4</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mod_auth_openidc | <2.1.4 | 2.1.4 |
mod_auth_openidc | <2.1.4 |
https://github.com/pingidentity/mod_auth_openidc/commit/612e309bfffd6f9b8ad7cdccda3019fc0865f3b4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6059 is classified as a medium severity vulnerability due to potential content spoofing risks.
To address CVE-2017-6059, update the mod_auth_openidc package to version 2.1.4 or later.
CVE-2017-6059 affects systems running mod_auth_openidc up to version 2.1.4.
CVE-2017-6059 can allow attackers to perform content spoofing attacks through manipulated error messages.
There is no official workaround for CVE-2017-6059; updating the software is the recommended approach.