CVE-2017-6062

NameCVE-2017-6062
DescriptionThe "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libapache2-mod-auth-openidc (PTS)buster2.3.10.2-1+deb10u1fixed
buster (security)2.3.10.2-1+deb10u4fixed
bullseye (security), bullseye2.4.9.4-0+deb11u3fixed
bookworm2.4.12.3-2fixed
trixie2.4.15.1-1fixed
sid2.4.15.7-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libapache2-mod-auth-openidcsourcejessie(not affected)
libapache2-mod-auth-openidcsource(unstable)2.1.5-1

Notes

[jessie] - libapache2-mod-auth-openidc <not-affected> (support for OIDCUnAuthAction added in 1.8.5rc1)
https://github.com/pingidentity/mod_auth_openidc/issues/222

Search for package or bug name: Reporting problems