Bug 1691126 (CVE-2019-3878)

Summary: CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bmesegue, hhorak, jdennis, jhrozek, jorton, luhliari, spoore, ssorce
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mod_auth_mellon 0.14.2 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:51:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1691136, 1692455, 1692456, 1692457, 1692458, 1692459, 1696197    
Bug Blocks: 1687978, 1691129    

Description Laura Pardo 2019-03-20 22:59:03 UTC
A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1576719

Upstream Patch:
https://github.com/Uninett/mod_auth_mellon/pull/196

Comment 1 Laura Pardo 2019-03-20 23:17:50 UTC
Created mod_auth_mellon tracking bugs for this issue:

Affects: fedora-all [bug 1691136]

Comment 6 Riccardo Schirone 2019-04-04 07:19:54 UTC
Statement:

This issue did not affect the versions of mod_auth_mellon as shipped with Red Hat Enterprise Linux 6 as they did not include support for ECP.

Comment 8 Doran Moppert 2019-04-11 04:33:15 UTC
External References:

https://github.com/Uninett/mod_auth_mellon/pull/196

Comment 9 errata-xmlrpc 2019-04-11 11:57:39 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS

Via RHSA-2019:0746 https://access.redhat.com/errata/RHSA-2019:0746

Comment 11 errata-xmlrpc 2019-04-16 14:40:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:0766 https://access.redhat.com/errata/RHSA-2019:0766

Comment 15 Jakub Hrozek 2019-05-02 13:40:21 UTC
*** Bug 1576719 has been marked as a duplicate of this bug. ***

Comment 16 errata-xmlrpc 2019-05-07 04:20:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2019:0985 https://access.redhat.com/errata/RHSA-2019:0985