Debian Security Advisory

DLA-2298-1 libapache2-mod-auth-openidc -- LTS security update

Date Reported:
29 Jul 2020
Affected Packages:
libapache2-mod-auth-openidc
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2019-14857, CVE-2019-20479, CVE-2019-1010247.
More information:

Several issues have been found in libapache2-mod-auth-openidc, the OpenID Connect authentication module for the Apache HTTP server.

  • CVE-2019-14857

    Insufficient validation of URLs leads to an Open Redirect vulnerability. An attacker may trick a victim into providing credentials for an OpenID provider by forwarding the request to an illegitimate website.

  • CVE-2019-20479

    Due to insufficient validatation of URLs an Open Redirect vulnerability for URLs beginning with a slash and backslash could be abused.

  • CVE-2019-1010247

    The OIDCRedirectURI page contains generated JavaScript code that uses a poll parameter as a string variable, thus might contain additional JavaScript code. This might result in Criss-Site Scripting (XSS).

    For Debian 9 stretch, these problems have been fixed in version 2.1.6-1+deb9u1.

    We recommend that you upgrade your libapache2-mod-auth-openidc packages.

    For the detailed security status of libapache2-mod-auth-openidc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc

    Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS