MGASA-2021-0452

Source
https://advisories.mageia.org/MGASA-2021-0452.html
Import Source
https://advisories.mageia.org/MGASA-2021-0452.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0452
Related
Published
2021-10-02T18:57:04Z
Modified
2021-10-02T18:27:58Z
Summary
Updated apache-mod_auth_openidc packages fix security vulnerability
Details

In versions prior to 2.4.9, oidc_validate_redirect_url() does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. (CVE-2021-32786)

In modauthopenidc before version 2.4.9, the AES GCM encryption in modauthopenidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. (CVE-2021-32791)

In modauthopenidc before version 2.4.9, there is an XSS vulnerability in when using OIDCPreservePost On. (CVE-2021-32792)

References
Credits

Affected packages

Mageia:8 / apache-mod_auth_openidc

Package

Name
apache-mod_auth_openidc
Purl
pkg:rpm/mageia/apache-mod_auth_openidc?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.9.4-1.mga8

Ecosystem specific

{
    "section": "core"
}