Vulnerability Name: | CVE-2019-3878 (CCN-158551) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-05-10 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2018-05-10 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-05-07 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
7.1 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-287 CWE-305 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-3878 Source: REDHAT Type: UNKNOWN RHBA-2019:0959 Source: REDHAT Type: Third Party Advisory RHSA-2019:0746 Source: REDHAT Type: Third Party Advisory RHSA-2019:0766 Source: REDHAT Type: UNKNOWN RHSA-2019:0985 Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3878 Source: XF Type: UNKNOWN apache-cve20193878-sec-bypass(158551) Source: CCN Type: mod_auth_mellon GIT Repository Modify am_handler setup to run before mod_proxy Source: CONFIRM Type: Exploit, Patch, Third Party Advisory https://github.com/Uninett/mod_auth_mellon/pull/196 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-db1e9b3002 Source: FEDORA Type: Mailing List, Release Notes, Third Party Advisory FEDORA-2019-2d8ee47f61 Source: UBUNTU Type: Third Party Advisory USN-3924-1 Source: CCN Type: Debian Security Advisory DSA-4414-1 libapache2-mod-auth-mellon -- security update | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |