CVE-2019-3878

Publication date 21 March 2019

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.1 · High

Score breakdown

A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.

Status

Package Ubuntu Release Status
libapache2-mod-auth-mellon 20.10 groovy
Fixed 0.14.2-1ubuntu1
20.04 LTS focal
Fixed 0.14.2-1ubuntu1
19.10 eoan
Fixed 0.14.2-1ubuntu1
19.04 disco
Fixed 0.14.2-1ubuntu1
18.10 cosmic
Fixed 0.14.0-1ubuntu0.1
18.04 LTS bionic
Fixed 0.13.1-1ubuntu0.1
16.04 LTS xenial
Fixed 0.12.0-2+deb9u1build0.16.04.1
14.04 LTS trusty Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libapache2-mod-auth-mellon

Severity score breakdown

Parameter Value
Base score 8.1 · High
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-3924-1
    • mod_auth_mellon vulnerabilities
    • 28 March 2019
    • USN-4597-1
    • mod_auth_mellon vulnerabilities
    • 22 October 2020

Other references