MGASA-2021-0452 - Updated apache-mod_auth_openidc packages fix security vulnerability

Publication date: 02 Oct 2021
URL: https://advisories.mageia.org/MGASA-2021-0452.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-32786,
     CVE-2021-32791,
     CVE-2021-32792,
     CVE-2021-32785

In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse
URLs the same way as most browsers do. As a result, this function can be
bypassed and leads to an Open Redirect vulnerability in the logout
functionality. (CVE-2021-32786)

In mod_auth_openidc before version 2.4.9, the AES GCM encryption in
mod_auth_openidc uses a static IV and AAD. It is important to fix because
this creates a static nonce and since aes-gcm is a stream cipher, this can
lead to known cryptographic issues, since the same key is being reused.
(CVE-2021-32791)

In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in
when using `OIDCPreservePost On`. (CVE-2021-32792)

References:
- https://bugs.mageia.org/show_bug.cgi?id=29344
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FZVF6BSJLRQZ7PFFR4X5JSU6KUJYNOCU/
- https://lists.suse.com/pipermail/sle-security-updates/2021-September/009431.html
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54B4RYNP5L63X2FMX2QCVYB2LGLL42IY/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32791
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32792
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32785

SRPMS:
- 8/core/apache-mod_auth_openidc-2.4.9.4-1.mga8

Mageia 2021-0452: apache-mod_auth_openidc security update

In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do

Summary

In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. (CVE-2021-32786)
In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. (CVE-2021-32791)
In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`. (CVE-2021-32792)

References

- https://bugs.mageia.org/show_bug.cgi?id=29344

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FZVF6BSJLRQZ7PFFR4X5JSU6KUJYNOCU/

- https://lists.suse.com/pipermail/sle-security-updates/2021-September/009431.html

- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54B4RYNP5L63X2FMX2QCVYB2LGLL42IY/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32786

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32791

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32792

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32785

Resolution

MGASA-2021-0452 - Updated apache-mod_auth_openidc packages fix security vulnerability

SRPMS

- 8/core/apache-mod_auth_openidc-2.4.9.4-1.mga8

Severity
Publication date: 02 Oct 2021
URL: https://advisories.mageia.org/MGASA-2021-0452.html
Type: security
CVE: CVE-2021-32786, CVE-2021-32791, CVE-2021-32792, CVE-2021-32785

Related News