Количество 15
Количество 15
ELSA-2019-0766
ELSA-2019-0766: mod_auth_mellon security and bug fix update (IMPORTANT)
CVE-2019-3878
A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
CVE-2019-3878
A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
CVE-2019-3878
A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
CVE-2019-3878
A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache ...
CVE-2019-3877
A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
CVE-2019-3877
A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
CVE-2019-3877
A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
CVE-2019-3877
A vulnerability was found in mod_auth_mellon before v0.14.2. An open r ...
GHSA-qr9h-f4fq-2h85
A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
GHSA-6gx9-985p-w8c8
A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
ELSA-2019-3421
ELSA-2019-3421: mod_auth_mellon security, bug fix, and enhancement update (MODERATE)
ELSA-2019-0985
ELSA-2019-0985: mod_auth_mellon security update (IMPORTANT)
BDU:2019-01572
Уязвимость функции register_hooks() веб-сервера Apache HTTP Server, связанная с возможностью обхода аутентификации, позволяющая нарушителю обойти существующий механизм контроля доступа
BDU:2019-01561
Уязвимость модуля аутентификации mod_auth_mellon сервера Apache HTTP Server, связанная с ошибками преобразования символов «\», позволяющая нарушителю перенаправить пользователя на вредоносный сайт
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2019-0766 ELSA-2019-0766: mod_auth_mellon security and bug fix update (IMPORTANT) | почти 7 лет назад | |||
CVE-2019-3878 A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication. | CVSS3: 8.1 | 3% Низкий | почти 7 лет назад | |
CVE-2019-3878 A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication. | CVSS3: 8.1 | 3% Низкий | почти 8 лет назад | |
CVE-2019-3878 A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication. | CVSS3: 8.1 | 3% Низкий | почти 7 лет назад | |
CVE-2019-3878 A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache ... | CVSS3: 8.1 | 3% Низкий | почти 7 лет назад | |
CVE-2019-3877 A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function. | CVSS3: 5.8 | 1% Низкий | почти 7 лет назад | |
CVE-2019-3877 A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function. | CVSS3: 6.1 | 1% Низкий | почти 7 лет назад | |
CVE-2019-3877 A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function. | CVSS3: 5.8 | 1% Низкий | почти 7 лет назад | |
CVE-2019-3877 A vulnerability was found in mod_auth_mellon before v0.14.2. An open r ... | CVSS3: 5.8 | 1% Низкий | почти 7 лет назад | |
GHSA-qr9h-f4fq-2h85 A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function. | CVSS3: 6.1 | 1% Низкий | больше 3 лет назад | |
GHSA-6gx9-985p-w8c8 A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication. | CVSS3: 8.1 | 3% Низкий | больше 3 лет назад | |
ELSA-2019-3421 ELSA-2019-3421: mod_auth_mellon security, bug fix, and enhancement update (MODERATE) | около 6 лет назад | |||
ELSA-2019-0985 ELSA-2019-0985: mod_auth_mellon security update (IMPORTANT) | больше 6 лет назад | |||
BDU:2019-01572 Уязвимость функции register_hooks() веб-сервера Apache HTTP Server, связанная с возможностью обхода аутентификации, позволяющая нарушителю обойти существующий механизм контроля доступа | CVSS3: 8.1 | 3% Низкий | больше 7 лет назад | |
BDU:2019-01561 Уязвимость модуля аутентификации mod_auth_mellon сервера Apache HTTP Server, связанная с ошибками преобразования символов «\», позволяющая нарушителю перенаправить пользователя на вредоносный сайт | CVSS3: 6.1 | 1% Низкий | почти 7 лет назад |
Уязвимостей на страницу