{"id":"AZL-7289","summary":"CVE-2021-39191 affecting package mod_auth_openidc for versions less than 2.4.14.2-1","details":"mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.","modified":"2026-04-01T05:22:13.388957Z","published":"2021-09-03T14:15:07Z","upstream":["CVE-2021-39191"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-39191"}],"affected":[{"package":{"name":"mod_auth_openidc","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/mod_auth_openidc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.14.2-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-7289.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}