Debian Security Advisory
DLA-2298-1 libapache2-mod-auth-openidc -- LTS security update
- Date Reported:
- 29 Jul 2020
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2019-14857, CVE-2019-20479, CVE-2019-1010247.
- More information:
Several issues have been found in libapache2-mod-auth-openidc, the OpenID Connect authentication module for the Apache HTTP server.
Insufficient validation of URLs leads to an Open Redirect vulnerability. An attacker may trick a victim into providing credentials for an OpenID provider by forwarding the request to an illegitimate website.
Due to insufficient validatation of URLs an Open Redirect vulnerability for URLs beginning with a slash and backslash could be abused.
For Debian 9 stretch, these problems have been fixed in version 2.1.6-1+deb9u1.
We recommend that you upgrade your libapache2-mod-auth-openidc packages.
For the detailed security status of libapache2-mod-auth-openidc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS