Unrated severityNVD Advisory· Published Sep 3, 2021· Updated Aug 4, 2024
URL Redirection to Untrusted Site ('Open Redirect') in mod_auth_openidc
CVE-2021-39191
Description
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the target_link_uri parameter. A patch in version 2.4.9.4 made it so that the OIDCRedirectURLsAllowed setting must be applied to the target_link_uri parameter. There are no known workarounds aside from upgrading to a patched version.
Affected products
1- Range: <=2.4.9.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32RGPW5LZDLDTB7MKZIGAHPSLFOUNWR5/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RHXO4O4G2UQS7X6OQJCVZKHZAQ7SAIFB/mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2023/07/msg00020.htmlmitremailing-list
- github.com/zmartzone/mod_auth_openidc/commit/03e6bfb446f4e3f27c003d30d6a433e5dd8e2b3dmitre
- github.com/zmartzone/mod_auth_openidc/issues/672mitre
- github.com/zmartzone/mod_auth_openidc/releases/tag/v2.4.9.4mitre
- github.com/zmartzone/mod_auth_openidc/security/advisories/GHSA-2pgf-8h6h-gqg2mitre
News mentions
0No linked articles in our index yet.