Ping Identity 'mod_auth_openidc' module is prone to a content-spoofing vulnerability because it fails to properly sanitize user-supplied input.
Attackers can exploit this issue to manipulate the page and spoof content, which may aid in further attacks.
Versions prior to mod_auth_openidc 2.1.4 are vulnerable.
Note: This issue also affects Apache HTTP Server 2.x using 'mod_auth_openidc' module.
Information
PingIdentity mod_auth_openidc 2.1.1
PingIdentity mod_auth_openidc 2.1
PingIdentity mod_auth_openidc 2.0
PingIdentity mod_auth_openidc 1.5
PingIdentity mod_auth_openidc 1.0.1
Apache HTTP Server 2.2.25
Apache HTTP Server 2.2.24
Apache HTTP Server 2.2.6 0
Apache HTTP Server 2.4.25
Exploit
An attacker can exploit this issue using a browser.
References:
- 'mod_auth_openidc' Release 2.1.4 (Ping Identity)
- don't echo query params on invalid requests to redirect URI; closes #212 (Ping Identity)
- mod_auth_openidc Product Page (Ping Identity)
- mod_auth_openidc/ChangeLog (Ping Identity)
- Don't show user-supplied content in error pages #212 (Ping Identity)