First published: Tue Apr 16 2019(Updated: )
The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.<br>Security Fix(es):<br><li> mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878)</li> <li> mod_auth_mellon: open redirect in logout url when using URLs with backslashes (CVE-2019-3877)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> mod_auth_mellon Cert files name wrong when hostname contains a number (fixed in upstream package) (BZ#1697487)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
mod_auth_mellon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:0766 is classified as important.
To fix RHSA-2019:0766, you should update the mod_auth_mellon package to the latest version provided by your operating system vendor.
RHSA-2019:0766 affects the mod_auth_mellon module for the Apache HTTP Server.
RHSA-2019:0766 addresses vulnerabilities related to improper handling of SAML assertions in the mod_auth_mellon module.
There are no recommended workarounds for RHSA-2019:0766 other than applying the update.