vulnerability
Amazon Linux AMI 2: CVE-2017-6413: Security patch for mod_auth_openidc (ALAS-2019-1329)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Mar 2, 2017 | Apr 27, 2020 | Apr 25, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Mar 2, 2017
Added
Apr 27, 2020
Modified
Apr 25, 2025
Description
The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.
Solutions
amazon-linux-ami-2-upgrade-mod_auth_openidcamazon-linux-ami-2-upgrade-mod_auth_openidc-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.