CVE Vulnerabilities

CVE-2017-6062

Improper Authentication

Published: Mar 02, 2017 | Modified: Nov 07, 2023
CVSS 3.x
8.6
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Ubuntu
MEDIUM

The OpenID Connect Relying Party and OAuth 2.0 Resource Server (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an OIDCUnAuthAction pass configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Mod_auth_openidc Openidc * 2.1.4 (including)
Libapache2-mod-auth-openidc Ubuntu artful *
Libapache2-mod-auth-openidc Ubuntu esm-apps/xenial *
Libapache2-mod-auth-openidc Ubuntu upstream *
Libapache2-mod-auth-openidc Ubuntu xenial *
Libapache2-mod-auth-openidc Ubuntu yakkety *
Libapache2-mod-auth-openidc Ubuntu zesty *

Potential Mitigations

References