{"vulnerability": "CVE-2022-23527", "sightings": [{"uuid": "2af08d25-f319-4566-a296-fad8f957d115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23527", "type": "seen", "source": "https://t.me/cibsecurity/54529", "content": "\u203c CVE-2022-23527 \u203c\n\nmod_auth_openidc is an OpenID Certified\u00e2\u201e\u00a2 authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-14T20:23:02.000000Z"}]}