{"id":"CVE-2024-24814","summary":"Denial of service when manipulating mod_auth_openidc_session_chunks cookie in mod_auth_openidc","details":"mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.","aliases":["GHSA-hxr6-w4gc-7vvv"],"modified":"2026-04-10T05:10:53.183013Z","published":"2024-02-13T18:46:53.531Z","related":["ALSA-2024:5289","ALSA-2024:9180","MGASA-2024-0081","SUSE-SU-2024:0757-1","SUSE-SU-2024:0758-1","SUSE-SU-2024:2299-1","SUSE-SU-2025:4532-1","openSUSE-SU-2024:13699-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/24xxx/CVE-2024-24814.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-400"]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00004.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7DKVEVREYAI4F46CQAVOTPL75WLOZOE/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/24xxx/CVE-2024-24814.json"},{"type":"ADVISORY","url":"https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24814"},{"type":"FIX","url":"https://github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openidc/mod_auth_openidc","events":[{"introduced":"4fe40bd8bed0c7697f4fb2c3733d02d472cb849e"},{"fixed":"4022c12f314bd89d127d1be008b1a80a08e1203d"}]}],"versions":["2.3.11rc1","v2.0.0","v2.1.0","v2.1.1","v2.1.2","v2.1.3","v2.1.4","v2.1.5","v2.1.6","v2.2.0","v2.3.0","v2.3.0rc0","v2.3.0rc3","v2.3.1","v2.3.10","v2.3.10.1","v2.3.10.2","v2.3.11","v2.3.2","v2.3.3","v2.3.4","v2.3.5","v2.3.6","v2.3.7","v2.3.8","v2.3.9","v2.4.0","v2.4.0.1","v2.4.0.2","v2.4.0.3","v2.4.0.4","v2.4.1","v2.4.10","v2.4.11","v2.4.11.1","v2.4.11.2","v2.4.11.3","v2.4.12","v2.4.12.1","v2.4.12.2","v2.4.12.3","v2.4.13","v2.4.13.1","v2.4.13.2","v2.4.14","v2.4.14.1","v2.4.14.2","v2.4.14.3","v2.4.14.4","v2.4.15","v2.4.15.1","v2.4.2","v2.4.2.1","v2.4.3","v2.4.4","v2.4.4.1","v2.4.5","v2.4.6","v2.4.7","v2.4.7.1","v2.4.7.2","v2.4.8.1","v2.4.8.2","v2.4.8.3","v2.4.8.4","v2.4.9","v2.4.9.1","v2.4.9.2","v2.4.9.3","v2.4.9.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-24814.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}