A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication. References: https://bugzilla.redhat.com/show_bug.cgi?id=1576719 Upstream Patch: https://github.com/Uninett/mod_auth_mellon/pull/196
Created mod_auth_mellon tracking bugs for this issue: Affects: fedora-all [bug 1691136]
Statement: This issue did not affect the versions of mod_auth_mellon as shipped with Red Hat Enterprise Linux 6 as they did not include support for ECP.
External References: https://github.com/Uninett/mod_auth_mellon/pull/196
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:0746 https://access.redhat.com/errata/RHSA-2019:0746
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0766 https://access.redhat.com/errata/RHSA-2019:0766
*** Bug 1576719 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:0985 https://access.redhat.com/errata/RHSA-2019:0985