Modauthopenidc.c in the Ping Identity OpenID Connect authentication module for Apache (aka modauthopenidc) before 2.14 allows remote attackers to spoof page content via a malicious URL provided to the user, which triggers an invalid request.
[
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"306393992651303049853274057305531253608",
"68826803240769547957311796036583225073",
"40663355824098006708642299200300097584",
"329732056193372188979464841177885681036",
"147759852546333290177267246415284115126"
],
"threshold": 0.9
},
"source": "https://github.com/openidc/mod_auth_openidc/commit/612e309bfffd6f9b8ad7cdccda3019fc0865f3b4",
"target": {
"file": "src/mod_auth_openidc.c"
},
"id": "CVE-2017-6059-2ed07565",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 1261.0,
"function_hash": "88358408798668581522977178368894674818"
},
"source": "https://github.com/openidc/mod_auth_openidc/commit/612e309bfffd6f9b8ad7cdccda3019fc0865f3b4",
"target": {
"function": "oidc_handle_redirect_uri_request",
"file": "src/mod_auth_openidc.c"
},
"id": "CVE-2017-6059-7f1240e7",
"signature_version": "v1",
"deprecated": false
}
]