First published: Wed Mar 20 2019(Updated: )
A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mod Auth Mellon Project Mod Auth Mellon | <0.14.2 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
redhat/mod_auth_mellon | <0.14.2 | 0.14.2 |
ubuntu/libapache2-mod-auth-mellon | <0.13.1-1ubuntu0.1 | 0.13.1-1ubuntu0.1 |
ubuntu/libapache2-mod-auth-mellon | <0.14.0-1ubuntu0.1 | 0.14.0-1ubuntu0.1 |
ubuntu/libapache2-mod-auth-mellon | <0.14.2-1ubuntu1 | 0.14.2-1ubuntu1 |
ubuntu/libapache2-mod-auth-mellon | <0.14.2-1ubuntu1 | 0.14.2-1ubuntu1 |
ubuntu/libapache2-mod-auth-mellon | <0.14.2-1ubuntu1 | 0.14.2-1ubuntu1 |
ubuntu/libapache2-mod-auth-mellon | <0.14.2-1ubuntu1 | 0.14.2-1ubuntu1 |
ubuntu/libapache2-mod-auth-mellon | <0.12.0-2+ | 0.12.0-2+ |
debian/libapache2-mod-auth-mellon | 0.17.0-1+deb11u1 0.18.1-1 0.19.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-3878 is high with a CVSS score of 8.1.
The vulnerability CVE-2019-3878 affects mod_auth_mellon versions before v0.14.2.
To fix CVE-2019-3878, it is recommended to update to mod_auth_mellon v0.14.2 or later.
To mitigate the risk of CVE-2019-3878, you should update mod_auth_mellon to version 0.14.2 or apply the necessary patches.
Yes, you can find references for CVE-2019-3878 at the following links: [link1], [link2], [link3].