First published: Mon Apr 03 2023(Updated: )
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openidc Mod Auth Openidc | >=2.0.0<2.4.13.2 | |
debian/libapache2-mod-auth-openidc | <=2.3.10.2-1+deb10u1 | 2.3.10.2-1+deb10u3 2.4.9.4-0+deb11u3 2.4.12.3-2 2.4.14.2-1 |
debian/libapache2-mod-auth-openidc | <=2.3.10.2-1+deb10u1<=2.4.9.4-0+deb11u2<=2.4.12.3-1 | 2.3.10.2-1+deb10u2 2.4.12.3-2 2.4.9.4-0+deb11u3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28625 is a vulnerability in mod_auth_openidc, an authentication and authorization module for the Apache 2.x HTTP server.
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality.
The severity of CVE-2023-28625 is high, with a CVSS score of 7.5.
CVE-2023-28625 affects mod_auth_openidc versions 2.0.0 through 2.4.13.1.
The vulnerability can be fixed by upgrading mod_auth_openidc to version 2.4.13.2 or later.