UBUNTU-CVE-2017-6062

Source
https://ubuntu.com/security/CVE-2017-6062
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-6062.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-6062
Upstream
Published
2017-03-02T06:59:00Z
Modified
2025-10-24T04:46:11Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka modauthopenidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDCCLAIM and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.

References

Affected packages

Ubuntu:16.04:LTS / libapache2-mod-auth-openidc

Package

Name
libapache2-mod-auth-openidc
Purl
pkg:deb/ubuntu/libapache2-mod-auth-openidc@1.8.5-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.6.0-1
1.8.5-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libapache2-mod-auth-openidc",
            "binary_version": "1.8.5-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-6062.json"