CVE-2019-3877

A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mod_auth_mellon_project:mod_auth_mellon:*:*:*:*:*:apache:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

History

21 Nov 2024, 04:42

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2019:0766 - () https://access.redhat.com/errata/RHSA-2019:0766 -
References () https://access.redhat.com/errata/RHSA-2019:3421 - () https://access.redhat.com/errata/RHSA-2019:3421 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3877 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3877 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8 - Patch, Third Party Advisory () https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8 - Patch, Third Party Advisory
References () https://github.com/Uninett/mod_auth_mellon/issues/35 - Patch, Third Party Advisory () https://github.com/Uninett/mod_auth_mellon/issues/35 - Patch, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNW5YMC5TLWVWNJEY6AIWNSNPRAMWPQJ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNW5YMC5TLWVWNJEY6AIWNSNPRAMWPQJ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7NLAU7KROWNTHAYSA2S67X347F42L2I/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7NLAU7KROWNTHAYSA2S67X347F42L2I/ -
References () https://usn.ubuntu.com/3924-1/ - Third Party Advisory () https://usn.ubuntu.com/3924-1/ - Third Party Advisory
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 5.8

07 Nov 2023, 03:10

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNW5YMC5TLWVWNJEY6AIWNSNPRAMWPQJ/', 'name': 'FEDORA-2019-db1e9b3002', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7NLAU7KROWNTHAYSA2S67X347F42L2I/', 'name': 'FEDORA-2019-2d8ee47f61', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7NLAU7KROWNTHAYSA2S67X347F42L2I/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNW5YMC5TLWVWNJEY6AIWNSNPRAMWPQJ/ -

Information

Published : 2019-03-27 13:29

Updated : 2024-11-21 04:42


NVD link : CVE-2019-3877

Mitre link : CVE-2019-3877

CVE.ORG link : CVE-2019-3877


JSON object : View

Products Affected

mod_auth_mellon_project

  • mod_auth_mellon

redhat

  • enterprise_linux

fedoraproject

  • fedora

canonical

  • ubuntu_linux
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')