5.8
CVSSv2

CVE-2021-39191

Published: 03/09/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions before 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openidc mod auth openidc

fedoraproject fedora 35

fedoraproject fedora 36

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #993648 libapache2-mod-auth-openidc: CVE-2021-39191 Package: src:libapache2-mod-auth-openidc; Maintainer for src:libapache2-mod-auth-openidc is Moritz Schlarb <schlarbm@uni-mainzde>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 4 Sep 2021 08:09:01 UTC Severity: important ...
mod_auth_openidc is an authentication/authorization module for the Apache 2x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider In versions prior to 2494, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by suppl ...