Open OnDemand affected by Apache proxy passing sensitive headers
Description
Open OnDemand provides remote web access to supercomputers. In versions 4.0.8 and prior, the Apache proxy allows sensitive headers to be passed to origin servers. This means malicious users can create an origin server on a compute node that record these headers when unsuspecting users connect to it. Maintainers anticipate a patch in a 4.1 release. Workarounds exist for 4.0.x versions. Using custom_location_directives in ood_portal.yml in version 4.0.x (not available for versions below 4.0) centers can unset and or edit these headers. Note that OIDCPassClaimsAs both is the default and centers can set OIDCPassClaimsAs to none or environment to stop passing these headers to the client. Centers that have an OIDC provider with the OIDCPassClaimsAs with none or environment settings can adjust the settings using guidance provided in GHSA-2cwp-8g29-9q32 to unset the mod_auth_openidc_session cookies.
Affected products
2- Range: <=4.0.8
- OSC/ondemandv5Range: <= 4.0.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/OSC/ondemand/security/advisories/GHSA-2cwp-8g29-9q32mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.