Impact
When providing a logout
parameter to the redirect URI, the existing code in oidc_validate_redirect_url()
does not properly check for URLs that start with /\t
, leading to an open redirect.
Patches
This bug has been fixed by adding an additional check for /\t
in oidc_validate_redirect_url()
Workarounds
This vulnerability can mitigated by configuring mod_auth_openidc to only allow redirection whose destination matches a given regular expression with OIDCRedirectURLsAllowed.
Impact
When providing a
logout
parameter to the redirect URI, the existing code inoidc_validate_redirect_url()
does not properly check for URLs that start with/\t
, leading to an open redirect.Patches
This bug has been fixed by adding an additional check for
/\t
inoidc_validate_redirect_url()
Workarounds
This vulnerability can mitigated by configuring mod_auth_openidc to only allow redirection whose destination matches a given regular expression with OIDCRedirectURLsAllowed.