mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Open Redirect in oidc_validate_redirect_url() | Open Redirect in oidc_validate_redirect_url() |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T16:32:19.916Z
Reserved: 2022-01-19T21:23:53.784Z
Link: CVE-2022-23527

No data.

Status : Modified
Published: 2022-12-14T18:15:20.850
Modified: 2024-11-21T06:48:45.187
Link: CVE-2022-23527
