In the SPNEGO HTTP Authentication Module for nginx (spnego-http-auth-nginx-module) before version 1.1.1 basic Authentication can be bypassed using a malformed username. This affects users of spnego-http-auth-nginx-module that have enabled basic authentication. This is fixed in version 1.1.1 of spnego-http-auth-nginx-module. As a workaround, one may disable basic authentication.
References
Link | Resource |
---|---|
https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570 | Patch Third Party Advisory |
https://github.com/stnoonan/spnego-http-auth-nginx-module/releases/tag/v1.1.1 | Third Party Advisory |
https://github.com/stnoonan/spnego-http-auth-nginx-module/security/advisories/GHSA-ww8q-72rx-hc54 | Patch Third Party Advisory |
https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570 | Patch Third Party Advisory |
https://github.com/stnoonan/spnego-http-auth-nginx-module/releases/tag/v1.1.1 | Third Party Advisory |
https://github.com/stnoonan/spnego-http-auth-nginx-module/security/advisories/GHSA-ww8q-72rx-hc54 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:48
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 5.3 |
References | () https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570 - Patch, Third Party Advisory | |
References | () https://github.com/stnoonan/spnego-http-auth-nginx-module/releases/tag/v1.1.1 - Third Party Advisory | |
References | () https://github.com/stnoonan/spnego-http-auth-nginx-module/security/advisories/GHSA-ww8q-72rx-hc54 - Patch, Third Party Advisory |
Information
Published : 2021-03-08 21:15
Updated : 2024-11-21 05:48
NVD link : CVE-2021-21335
Mitre link : CVE-2021-21335
CVE.ORG link : CVE-2021-21335
JSON object : View
Products Affected
spnego_http_authentication_module_project
- spnego_http_authentication_module
CWE
CWE-287
Improper Authentication