Lucene search

K
amazonAmazonALAS-2020-1448
HistoryNov 14, 2020 - 1:23 a.m.

Medium: mod24_auth_openidc

2020-11-1401:23:00
alas.aws.amazon.com
12

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

68.5%

Issue Overview:

An open redirect flaw was discovered in mod_auth_openidc, where it handles logout redirection. The module does not correctly validate the URL, allowing a URL with leading slashes to bypass the protection checks. A victim user may be tricked into visiting a trusted vulnerable web site, which would redirect them to another possibly malicious URL. (CVE-2019-14857)

An open redirect flaw was discovered in mod_auth_openidc where it handles logout redirection. The module does not correctly validate the URL, allowing a URL with slash and backslash at the beginning to bypass the protection checks. A victim user may be tricked into visiting a trusted vulnerable web site, which would redirect him to another, possibly malicious, URL. (CVE-2019-20479)

Affected Packages:

mod24_auth_openidc

Issue Correction:
Run yum update mod24_auth_openidc to update your system.

New Packages:

i686:  
    mod24_auth_openidc-debuginfo-1.8.8-7.6.amzn1.i686  
    mod24_auth_openidc-1.8.8-7.6.amzn1.i686  
  
src:  
    mod24_auth_openidc-1.8.8-7.6.amzn1.src  
  
x86_64:  
    mod24_auth_openidc-1.8.8-7.6.amzn1.x86_64  
    mod24_auth_openidc-debuginfo-1.8.8-7.6.amzn1.x86_64  

Additional References

Red Hat: CVE-2019-14857, CVE-2019-20479

Mitre: CVE-2019-14857, CVE-2019-20479

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

68.5%