Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3878

Опубликовано: 10 мая 2018
Источник: redhat
CVSS3: 8.1

Описание

A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.

A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.

Отчет

This issue did not affect the versions of mod_auth_mellon as shipped with Red Hat Enterprise Linux 6 as they did not include support for ECP.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6mod_auth_mellonNot affected
Red Hat Enterprise Linux 7mod_auth_mellonFixedRHSA-2019:076616.04.2019
Red Hat Enterprise Linux 8mod_auth_mellonFixedRHSA-2019:098507.05.2019
Red Hat Software Collections for Red Hat Enterprise Linux 6httpd24-httpdFixedRHSA-2019:074611.04.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7httpd24-httpdFixedRHSA-2019:074611.04.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7httpd24-mod_auth_mellonFixedRHSA-2019:074611.04.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUShttpd24-httpdFixedRHSA-2019:074611.04.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUShttpd24-mod_auth_mellonFixedRHSA-2019:074611.04.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUShttpd24-httpdFixedRHSA-2019:074611.04.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUShttpd24-mod_auth_mellonFixedRHSA-2019:074611.04.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=1691126mod_auth_mellon: authentication bypass in ECP flow

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 7 лет назад

A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.

CVSS3: 8.1
nvd
почти 7 лет назад

A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.

CVSS3: 8.1
debian
почти 7 лет назад

A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache ...

CVSS3: 8.1
github
больше 3 лет назад

A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.

oracle-oval
больше 6 лет назад

ELSA-2019-0985: mod_auth_mellon security update (IMPORTANT)

8.1 High

CVSS3