Bug 2361633 (CVE-2025-3891)

Summary: CVE-2025-3891 mod_auth_openidc: DoS via Empty POST in mod_auth_openidc with OIDCPreservePost Enabled
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aogburn, carnil, hans.zandbelt, prodsec-dev, schlarbm, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---Flags: carnil: needinfo? (prodsec-dev)
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-04-22 11:20:41 UTC
An unauthenticated attacker can crash the Apache httpd process by sending an empty POST request when OIDCPreservePost is enabled in mod_auth_openidc. This leads to denial of service.

Comment 3 Salvatore Bonaccorso 2025-05-02 12:34:28 UTC
Hi

Can you share details about this CVE assiignment? 

According to the Debian maintainer and upstream of the project they were not informed about this issue and as well cannot reproduce crashes, cf.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104484#10

Can you please elaborate?

Regards,
Salvatore

Comment 4 errata-xmlrpc 2025-05-06 20:16:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:4597 https://access.redhat.com/errata/RHSA-2025:4597

Comment 5 Aaron Ogburn 2025-05-06 21:07:16 UTC
Note this is not an issue with upstream mod_auth_openidc 2.4.13.2+ where the issue has already been addressed by https://github.com/OpenIDC/mod_auth_openidc/commit/29ea79dea97cdab1b0d150af2c9a50a442e7216e.

Comment 6 Hans Zandbelt 2025-05-07 05:29:01 UTC
Upstream here: thanks for the details on this CVE. Apparently it is not an empty POST request that causes the crash but rather a missing Content-Type header, as the link to the patch commit also shows. Affected versions are >= 2.0.0 and <= 2.4.13.1, see the newly created advisory on Github - based on this issue - here: https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-x7cf-8wgv-5j86

Comment 7 errata-xmlrpc 2025-06-23 15:54:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:9396 https://access.redhat.com/errata/RHSA-2025:9396