CVE-2022-23527

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openidc:mod_auth_openidc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-12-14 18:15

Updated : 2023-07-21 19:25


NVD link : CVE-2022-23527

Mitre link : CVE-2022-23527

CVE.ORG link : CVE-2022-23527


JSON object : View

Products Affected

debian

  • debian_linux

openidc

  • mod_auth_openidc
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')