First published: Tue Feb 21 2017(Updated: )
It was found that the OpenID Connect authentication module for Apache is vulnerable to Content Spoofing due to the user-supplied content being shown in the error pages. Upstream bug: <a href="https://github.com/pingidentity/mod_auth_openidc/issues/212">https://github.com/pingidentity/mod_auth_openidc/issues/212</a> Upstream patch: <a href="https://github.com/pingidentity/mod_auth_openidc/commit/612e309bfffd6f9b8ad7cdccda3019fc0865f3b4">https://github.com/pingidentity/mod_auth_openidc/commit/612e309bfffd6f9b8ad7cdccda3019fc0865f3b4</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openidc Mod Auth Openidc | <2.1.4 | |
redhat/mod_auth_openidc | <2.1.4 | 2.1.4 |
https://github.com/pingidentity/mod_auth_openidc/commit/612e309bfffd6f9b8ad7cdccda3019fc0865f3b4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.