<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2-mod_auth_openidc</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:1286-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-04-15T16:24:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-04-15T16:24:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-04-15T16:24:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2-mod_auth_openidc</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2-mod_auth_openidc fixes the following issues:

- CVE-2025-31492: Fixed a bug where OIDCProviderAuthRequestMethod POSTs can leak protected data. (bsc#1240893)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-1286,SUSE-SLE-Module-Server-Applications-15-SP6-2025-1286,openSUSE-SLE-15.6-2025-1286</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251286-1/</URL>
      <Description>Link for SUSE-SU-2025:1286-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-April/039009.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:1286-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1240893</URL>
      <Description>SUSE Bug 1240893</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-31492/</URL>
      <Description>SUSE CVE CVE-2025-31492 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6" CPE="cpe:/o:suse:sle-module-server-applications:15:sp6">SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-mod_auth_openidc-2.3.8-150600.16.8.1">
      <FullProductName ProductID="apache2-mod_auth_openidc-2.3.8-150600.16.8.1">apache2-mod_auth_openidc-2.3.8-150600.16.8.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-mod_auth_openidc-2.3.8-150600.16.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-mod_auth_openidc-2.3.8-150600.16.8.1">apache2-mod_auth_openidc-2.3.8-150600.16.8.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-mod_auth_openidc-2.3.8-150600.16.8.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:apache2-mod_auth_openidc-2.3.8-150600.16.8.1">apache2-mod_auth_openidc-2.3.8-150600.16.8.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, which has the opportunity to prevent the normal output being issued by httpd. oidc_content_handler has a number of checks for when it intervenes, but it doesn't check for this case, so the handler returns DECLINED. Consequently, httpd appends the protected content to the response. The issue has been patched in mod_auth_openidc versions &gt;= 2.4.16.11.</Note>
    </Notes>
    <CVE>CVE-2025-31492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:apache2-mod_auth_openidc-2.3.8-150600.16.8.1</ProductID>
        <ProductID>openSUSE Leap 15.6:apache2-mod_auth_openidc-2.3.8-150600.16.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251286-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-31492.html</URL>
        <Description>CVE-2025-31492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240893</URL>
        <Description>SUSE Bug 1240893</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
