vulnerability
Amazon Linux AMI: CVE-2017-6413: Security patch for mod24_auth_openidc (ALAS-2019-1300)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Mar 2, 2017 | Oct 4, 2019 | Oct 4, 2019 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Mar 2, 2017
Added
Oct 4, 2019
Modified
Oct 4, 2019
Description
The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.
Solution
amazon-linux-upgrade-mod24_auth_openidc
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.