zmartzone mod_auth_openidc 指向未可信站点的url重定向(开放重定向)

admin 2023-11-30 20:01:43 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 zmartzone mod_auth_openidc 指向未可信站点的url重定向(开放重定向)

CVE编号

CVE-2021-39191

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2021-09-03
漏洞描述
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/zmartzone/mod_auth_openidc/commit/03e6bfb446f4e3f27c003d30...
https://github.com/zmartzone/mod_auth_openidc/issues/672
https://github.com/zmartzone/mod_auth_openidc/releases/tag/v2.4.9.4
https://github.com/zmartzone/mod_auth_openidc/security/advisories/GHSA-2pgf-8h6h-gqg2
https://lists.debian.org/debian-lts-announce/2023/07/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 zmartzone mod_auth_openidc * Up to (excluding) 2.4.9.4
运行在以下环境
系统 anolis_os_8 mod_auth_openidc * Up to (excluding) 0.6.1-2
运行在以下环境
系统 debian_10 libapache2-mod-auth-openidc * Up to (excluding) 2.3.10.2-1+deb10u3
运行在以下环境
系统 debian_11 libapache2-mod-auth-openidc * Up to (excluding) 2.4.9.4-0+deb11u1
运行在以下环境
系统 debian_12 libapache2-mod-auth-openidc * Up to (excluding) 2.4.9.4-1
运行在以下环境
系统 debian_9 libapache2-mod-auth-openidc * Up to (including) 2.1.6-1
运行在以下环境
系统 debian_sid libapache2-mod-auth-openidc * Up to (excluding) 2.4.9.4-1
运行在以下环境
系统 fedora_35 mod_auth_openidc-debuginfo * Up to (excluding) 2.4.9.4-1.fc35
运行在以下环境
系统 fedora_36 mod_auth_openidc * Up to (excluding) 2.4.9.4-1.fc36
运行在以下环境
系统 fedora_37 mod_auth_openidc * Up to (excluding) 2.4.9.4-1.fc37
运行在以下环境
系统 fedora_39 mod_auth_openidc-debuginfo * Up to (excluding) 2.4.12.3-2.fc39
运行在以下环境
系统 opensuse_Leap_15.4 apache2-mod_auth_openidc * Up to (excluding) 2.3.8-150100.3.22.1
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 0.6.1-2.module+el8+5139+bcb28322
运行在以下环境
系统 suse_12_SP5 apache2-mod_auth_openidc * Up to (excluding) 2.4.0-3.23.1
阿里云评分 6.1
  • 攻击路径 远程
  • 攻击复杂度 困难
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 POC 已公开
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 传输被破坏
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-601 指向未可信站点的URL重定向(开放重定向)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0