mod_auth_openidc-1.8.8-5.el7

エラータID: AXSA:2019-4244:01

Release date: 
Thursday, September 12, 2019 - 08:58
Subject: 
mod_auth_openidc-1.8.8-5.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

mod_auth_openidc enables an Apache 2.x web server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.

Security Fix(es):

* mod_auth_openidc: OIDC_CLAIM and OIDCAuthNHeader not skipped in an "AuthType oauth20" configuration (CVE-2017-6413)

* mod_auth_openidc: Shows user-supplied content on error pages (CVE-2017-6059)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2017-6059
Mod_auth_openidc.c in the Ping Identity OpenID Connect authentication module for Apache (aka mod_auth_openidc) before 2.14 allows remote attackers to spoof page content via a malicious URL provided to the user, which triggers an invalid request.
CVE-2017-6413
The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. mod_auth_openidc-1.8.8-5.el7.src.rpm
    MD5: dbd247c5cb17714478fe3e5eae59e66f
    SHA-256: f3804a10e54b1f68b6cc17bcfaf7eb75daade47c2011fb72d2c98a9df854978c
    Size: 172.20 kB

Asianux Server 7 for x86_64
  1. mod_auth_openidc-1.8.8-5.el7.x86_64.rpm
    MD5: 5de7b3231976f14724a13e0d1c3a1ccc
    SHA-256: de618b7ca7da938efdd2365b4b68122a8a78c718b48beebb19f3d1f97d910b32
    Size: 123.09 kB