CVE-2021-21335

In the SPNEGO HTTP Authentication Module for nginx (spnego-http-auth-nginx-module) before version 1.1.1 basic Authentication can be bypassed using a malformed username. This affects users of spnego-http-auth-nginx-module that have enabled basic authentication. This is fixed in version 1.1.1 of spnego-http-auth-nginx-module. As a workaround, one may disable basic authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:spnego_http_authentication_module_project:spnego_http_authentication_module:*:*:*:*:*:nginx:*:*

History

21 Nov 2024, 05:48

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 5.3
References () https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570 - Patch, Third Party Advisory () https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570 - Patch, Third Party Advisory
References () https://github.com/stnoonan/spnego-http-auth-nginx-module/releases/tag/v1.1.1 - Third Party Advisory () https://github.com/stnoonan/spnego-http-auth-nginx-module/releases/tag/v1.1.1 - Third Party Advisory
References () https://github.com/stnoonan/spnego-http-auth-nginx-module/security/advisories/GHSA-ww8q-72rx-hc54 - Patch, Third Party Advisory () https://github.com/stnoonan/spnego-http-auth-nginx-module/security/advisories/GHSA-ww8q-72rx-hc54 - Patch, Third Party Advisory

Information

Published : 2021-03-08 21:15

Updated : 2024-11-21 05:48


NVD link : CVE-2021-21335

Mitre link : CVE-2021-21335

CVE.ORG link : CVE-2021-21335


JSON object : View

Products Affected

spnego_http_authentication_module_project

  • spnego_http_authentication_module
CWE
CWE-287

Improper Authentication