CVE-2021-39191

MEDIUM

Mod Auth Openidc < 2.4.9.4 - Open Redirect

Title source: rule
STIX 2.1

Description

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.

Scores

CVSS v3 4.7
EPSS 0.0033
EPSS Percentile 56.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Details

CWE
CWE-601
Status published
Products (4)
debian/debian_linux 10.0
fedoraproject/fedora 35
fedoraproject/fedora 36
openidc/mod_auth_openidc < 2.4.9.4
Published Sep 03, 2021
Tracked Since Feb 18, 2026