CVE-2017-6413

HIGH

Mod Auth Openidc < 2.1.5 - Authentication Bypass

Title source: rule
STIX 2.1

Description

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

References (8)

Core 8
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/pingidentity/mod_auth_openidc/blob/master/ChangeLog
Patch, Release Notes, Third Party Advisory x_refsource_confirm
https://github.com/pingidentity/mod_auth_openidc/releases/tag/v2.1.6
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/96549
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2112

Scores

CVSS v3 8.6
EPSS 0.0041
EPSS Percentile 61.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

Details

CWE
CWE-287
Status published
Products (1)
openidc/mod_auth_openidc < 2.1.5
Published Mar 02, 2017
Tracked Since Feb 18, 2026