In the SPNEGO HTTP Authentication Module for nginx (spnego-http-auth-nginx-module) before version 1.1.1 basic Authentication can be bypassed using a malformed username. This affects users of spnego-http-auth-nginx-module that have enabled basic authentication. This is fixed in version 1.1.1 of spnego-http-auth-nginx-module. As a workaround, one may disable basic authentication.
References
Link | Resource |
---|---|
https://github.com/stnoonan/spnego-http-auth-nginx-module/security/advisories/GHSA-ww8q-72rx-hc54 | Patch Third Party Advisory |
https://github.com/stnoonan/spnego-http-auth-nginx-module/releases/tag/v1.1.1 | Third Party Advisory |
https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-03-08 13:15
Updated : 2021-03-12 06:21
NVD link : CVE-2021-21335
Mitre link : CVE-2021-21335
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
spnego_http_authentication_module_project
- spnego_http_authentication_module