7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.0004 Low
EPSS
Percentile
15.7%
mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
openidc | mod_auth_openidc | * | cpe:2.3:a:openidc:mod_auth_openidc:*:*:*:*:*:*:*:* |
[
{
"vendor": "OpenIDC",
"product": "mod_auth_openidc",
"versions": [
{
"version": ">= 2.0.0, < 2.4.15.2",
"status": "affected"
}
]
}
]
github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d
github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv
lists.debian.org/debian-lts-announce/2024/03/msg00004.html
lists.fedoraproject.org/archives/list/[email protected]/message/T7DKVEVREYAI4F46CQAVOTPL75WLOZOE/