A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
References
Link | Resource |
---|---|
https://github.com/Uninett/mod_auth_mellon/issues/35 | Patch Third Party Advisory |
https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3877 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3924-1/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNW5YMC5TLWVWNJEY6AIWNSNPRAMWPQJ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7NLAU7KROWNTHAYSA2S67X347F42L2I/ | |
https://access.redhat.com/errata/RHSA-2019:0766 | |
https://access.redhat.com/errata/RHSA-2019:3421 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2019-03-27 06:29
Updated : 2019-04-16 11:29
NVD link : CVE-2019-3877
Mitre link : CVE-2019-3877
JSON object : View
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Products Affected
redhat
- enterprise_linux
canonical
- ubuntu_linux
mod_auth_mellon_project
- mod_auth_mellon
fedoraproject
- fedora