中危 zmartzone mod_auth_openidc 指向未可信站点的url重定向(开放重定向)
CVE编号
CVE-2021-39191利用情况
POC 已公开补丁情况
官方补丁披露时间
2021-09-03漏洞描述
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | zmartzone | mod_auth_openidc | * | Up to (excluding) 2.4.9.4 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | mod_auth_openidc | * | Up to (excluding) 0.6.1-2 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | libapache2-mod-auth-openidc | * | Up to (excluding) 2.3.10.2-1+deb10u3 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | libapache2-mod-auth-openidc | * | Up to (excluding) 2.4.9.4-0+deb11u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | libapache2-mod-auth-openidc | * | Up to (excluding) 2.4.9.4-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_9 | libapache2-mod-auth-openidc | * | Up to (including) 2.1.6-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | libapache2-mod-auth-openidc | * | Up to (excluding) 2.4.9.4-1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_35 | mod_auth_openidc-debuginfo | * | Up to (excluding) 2.4.9.4-1.fc35 | |||||
运行在以下环境 | |||||||||
系统 | fedora_36 | mod_auth_openidc | * | Up to (excluding) 2.4.9.4-1.fc36 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | mod_auth_openidc | * | Up to (excluding) 2.4.9.4-1.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_39 | mod_auth_openidc-debuginfo | * | Up to (excluding) 2.4.12.3-2.fc39 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | apache2-mod_auth_openidc | * | Up to (excluding) 2.3.8-150100.3.22.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 0.6.1-2.module+el8+5139+bcb28322 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | apache2-mod_auth_openidc | * | Up to (excluding) 2.4.0-3.23.1 | |||||
- 攻击路径 远程
- 攻击复杂度 困难
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 POC 已公开
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 传输被破坏
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-601 | 指向未可信站点的URL重定向(开放重定向) |
Exp相关链接
- avd.aliyun.com
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论