CVE-2024-24814

7.5 HIGH

📋 TL;DR

CVE-2024-24814 is a denial-of-service vulnerability in mod_auth_openidc where attackers can send specially crafted cookies with large integer values to cause excessive resource consumption and server unresponsiveness. This affects Apache web servers using mod_auth_openidc for OpenID Connect authentication. The vulnerability requires no authentication and can be exploited with minimal effort.

💻 Affected Systems

Products:
  • mod_auth_openidc
Versions: All versions before 2.4.15.2
Operating Systems: Linux, Unix, Windows (with Apache)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where mod_auth_openidc is enabled and configured for OpenID Connect authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server unresponsiveness leading to service outage for all users, potentially requiring server restart and causing extended downtime.

🟠

Likely Case

Temporary performance degradation or intermittent 500 errors affecting user authentication and application availability.

🟢

If Mitigated

Minimal impact with proper input validation and resource limits in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending HTTP requests with manipulated mod_auth_openidc_session_chunks cookie values, which can be easily automated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.15.2

Vendor Advisory: https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download mod_auth_openidc version 2.4.15.2 or later. 3. Install the updated module. 4. Restart Apache web server. 5. Verify the new version is active.

🔧 Temporary Workarounds

No official workarounds

all

The vendor advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests with suspicious mod_auth_openidc_session_chunks cookie values
  • Monitor server resources and implement rate limiting to detect and block DoS attempts

🔍 How to Verify

Check if Vulnerable:

Check if mod_auth_openidc is loaded in Apache configuration and version is below 2.4.15.2

Check Version:

httpd -M | grep auth_openidc && grep 'mod_auth_openidc' /path/to/apache/modules/mod_auth_openidc.so

Verify Fix Applied:

Verify mod_auth_openidc version is 2.4.15.2 or higher and test with crafted cookie values

📡 Detection & Monitoring

Log Indicators:

  • HTTP 500 errors with mod_auth_openidc in error logs
  • Unusually long request processing times
  • High CPU/memory usage spikes

Network Indicators:

  • HTTP requests containing mod_auth_openidc_session_chunks cookie with large integer values
  • Multiple rapid requests from single IPs

SIEM Query:

source="apache_access" AND (cookie="*mod_auth_openidc_session_chunks=*" AND status=500) OR (response_time>10s)

🔗 References

📤 Share & Export