CVE-2023-28625
CVSS V2 None
CVSS V3 None
Description
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.
Overview
- CVE ID
- CVE-2023-28625
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-03T14:15:07
- Last Modified Date
- 2023-04-11T06:47:59
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 1 | OR | 2.0.0 | 2.4.13.2 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/OpenIDC/mod_auth_openidc/blame/3f11976dab56af0a46a7dddb7a275cc16d6eb726/src/mod_auth_openidc.c#L178-L179 | Third Party Advisory |
https://github.com/OpenIDC/mod_auth_openidc/commit/c0e1edac3c4c19988ccdc7713d7aebfce6ff916a | Patch |
https://github.com/OpenIDC/mod_auth_openidc/releases/tag/v2.4.13.2 | Release Notes |
https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-f5xw-rvfr-24qr | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28625 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28625 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 04:02:17 | Added to TrackCVE | |||
2023-04-17 04:02:20 | Weakness Enumeration | new |