CVE Vulnerabilities

CVE-2017-6413

Improper Authentication

Published: Mar 02, 2017 | Modified: Nov 07, 2023
CVSS 3.x
8.6
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM

The OpenID Connect Relying Party and OAuth 2.0 Resource Server (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an AuthType oauth20 configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Mod_auth_openidc Openidc * 2.1.5 (including)
Red Hat Enterprise Linux 7 RedHat mod_auth_openidc-0:1.8.8-5.el7 *
Libapache2-mod-auth-openidc Ubuntu artful *
Libapache2-mod-auth-openidc Ubuntu esm-apps/xenial *
Libapache2-mod-auth-openidc Ubuntu upstream *
Libapache2-mod-auth-openidc Ubuntu xenial *
Libapache2-mod-auth-openidc Ubuntu yakkety *
Libapache2-mod-auth-openidc Ubuntu zesty *

Potential Mitigations

References