Impact
When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect.
Patches
This bug has been fixed by adding an additional check for /\t in oidc_validate_redirect_url()
Workarounds
This vulnerability can mitigated by configuring mod_auth_openidc to only allow redirection whose destination matches a given regular expression with OIDCRedirectURLsAllowed.
Impact
When providing a
logoutparameter to the redirect URI, the existing code inoidc_validate_redirect_url()does not properly check for URLs that start with/\t, leading to an open redirect.Patches
This bug has been fixed by adding an additional check for
/\tinoidc_validate_redirect_url()Workarounds
This vulnerability can mitigated by configuring mod_auth_openidc to only allow redirection whose destination matches a given regular expression with OIDCRedirectURLsAllowed.