CVE Vulnerabilities

CVE-2017-6413

Improper Authentication

Published: Mar 02, 2017 | Modified: Apr 20, 2025
CVSS 3.x
8.6
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The OpenID Connect Relying Party and OAuth 2.0 Resource Server (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an AuthType oauth20 configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Mod_auth_openidcOpenidc*2.1.5 (including)
Red Hat Enterprise Linux 7RedHatmod_auth_openidc-0:1.8.8-5.el7*
Libapache2-mod-auth-openidcUbuntuartful*
Libapache2-mod-auth-openidcUbuntuesm-apps/xenial*
Libapache2-mod-auth-openidcUbuntuupstream*
Libapache2-mod-auth-openidcUbuntuxenial*
Libapache2-mod-auth-openidcUbuntuyakkety*
Libapache2-mod-auth-openidcUbuntuzesty*

Potential Mitigations

References