|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for libapache2-mod-auth-openidc (DLA-2298-1)|
|Summary:||The remote host is missing an update for the 'libapache2-mod-auth-openidc'; package(s) announced via the DLA-2298-1 advisory.|
The remote host is missing an update for the 'libapache2-mod-auth-openidc'
package(s) announced via the DLA-2298-1 advisory.
Several issues have been found in libapache2-mod-auth-openidc, the OpenID
Connect authentication module for the Apache HTTP server.
Insufficient validation of URLs leads to an Open Redirect
vulnerability. An attacker may trick a victim into providing
credentials for an OpenID provider by forwarding the request to an
Due to insufficient validatation of URLs an Open Redirect
vulnerability for URLs beginning with a slash and backslash could be
a poll parameter as a string variable, thus might contain additional
'libapache2-mod-auth-openidc' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your libapache2-mod-auth-openidc packages.
Common Vulnerability Exposure (CVE) ID: CVE-2019-1010247|
Common Vulnerability Exposure (CVE) ID: CVE-2019-14857
Common Vulnerability Exposure (CVE) ID: CVE-2019-20479
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.