First published: Thu Mar 02 2017(Updated: )
The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mod_auth_openidc | <2.1.6 | 2.1.6 |
mod_auth_openidc | <=2.1.5 |
https://github.com/pingidentity/mod_auth_openidc/commit/21e3728a825c41ab41efa75e664108051bb9665e
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6413 has been classified as a medium severity vulnerability.
To fix CVE-2017-6413, upgrade the mod_auth_openidc module to version 2.1.6 or later.
CVE-2017-6413 is caused by the mod_auth_openidc module not properly skipping certain headers in an oauth20 configuration.
CVE-2017-6413 affects users of the mod_auth_openidc module version prior to 2.1.6 on Apache HTTP Server.
The impact of CVE-2017-6413 allows remote attackers to bypass authentication, potentially leading to unauthorized access.