Vulnerability Details CVE-2023-28625
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 34.6%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-28625
-
cpe:2.3:a:openidc:mod_auth_openidc:2.0.0
-
cpe:2.3:a:openidc:mod_auth_openidc:2.1.0
-
cpe:2.3:a:openidc:mod_auth_openidc:2.1.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.1.13
-
cpe:2.3:a:openidc:mod_auth_openidc:2.1.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.1.3
-
cpe:2.3:a:openidc:mod_auth_openidc:2.1.4
-
cpe:2.3:a:openidc:mod_auth_openidc:2.1.5
-
cpe:2.3:a:openidc:mod_auth_openidc:2.1.6
-
cpe:2.3:a:openidc:mod_auth_openidc:2.2.0
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.0
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.10
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.10.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.10.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.11
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.3
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.4
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.5
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.6
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.7
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.8
-
cpe:2.3:a:openidc:mod_auth_openidc:2.3.9
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.0
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.0.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.0.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.0.3
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.0.4
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.10
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.11
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.11.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.11.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.11.3
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.12
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.12.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.12.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.12.3
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.13
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.13.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.2.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.3
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.4
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.4.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.5
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.6
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.7
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.7.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.7.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.8.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.8.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.8.3
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.8.4
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.9
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.9.1
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.9.2
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.9.3
-
cpe:2.3:a:openidc:mod_auth_openidc:2.4.9.4