CVE-2017-6413

NameCVE-2017-6413
DescriptionThe "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libapache2-mod-auth-openidc (PTS)jessie, jessie (lts)1.6.0-1+deb8u3vulnerable
stretch (security), stretch (lts), stretch2.1.6-1+deb9u1fixed
buster2.3.10.2-1+deb10u1fixed
buster (security)2.3.10.2-1+deb10u4fixed
bullseye (security), bullseye2.4.9.4-0+deb11u3fixed
bookworm2.4.12.3-2fixed
sid, trixie2.4.15.7-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libapache2-mod-auth-openidcsource(unstable)2.1.6-1

Notes

[jessie] - libapache2-mod-auth-openidc <no-dsa> (Minor issue)
https://github.com/pingidentity/mod_auth_openidc/commit/21e3728a825c41ab41efa75e664108051bb9665e

Search for package or bug name: Reporting problems