8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.008 Low
EPSS
Percentile
81.2%
Issue Overview:
A text injection flaw was found in how mod_auth_openidc handled error pages. An attacker could potentially use this flaw to conduct content spoofing and phishing attacks by tricking users into opening specially crafted URLs. (CVE-2017-6059)
It was found that mod_auth_openidc did not properly sanitize HTTP headers for certain request paths. A remote attacker could potentially use this flaw to bypass authentication and access sensitive information by sending crafted HTTP requests. (CVE-2017-6413 )
Affected Packages:
mod24_auth_openidc
Issue Correction:
Run yum update mod24_auth_openidc to update your system.
New Packages:
i686:
mod24_auth_openidc-1.8.8-5.5.amzn1.i686
mod24_auth_openidc-debuginfo-1.8.8-5.5.amzn1.i686
src:
mod24_auth_openidc-1.8.8-5.5.amzn1.src
x86_64:
mod24_auth_openidc-debuginfo-1.8.8-5.5.amzn1.x86_64
mod24_auth_openidc-1.8.8-5.5.amzn1.x86_64
Red Hat: CVE-2017-6059, CVE-2017-6413
Mitre: CVE-2017-6059, CVE-2017-6413
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | mod24_auth_openidc | < 1.8.8-5.5.amzn1 | mod24_auth_openidc-1.8.8-5.5.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod24_auth_openidc-debuginfo | < 1.8.8-5.5.amzn1 | mod24_auth_openidc-debuginfo-1.8.8-5.5.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | mod24_auth_openidc-debuginfo | < 1.8.8-5.5.amzn1 | mod24_auth_openidc-debuginfo-1.8.8-5.5.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | mod24_auth_openidc | < 1.8.8-5.5.amzn1 | mod24_auth_openidc-1.8.8-5.5.amzn1.x86_64.rpm |
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.008 Low
EPSS
Percentile
81.2%