Bug 1691126 (CVE-2019-3878) - CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow
Summary: CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-3878
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20180510,repo...
: 1576719 (view as bug list)
Depends On: 1692457 1691136 1692455 1692456 1692458 1692459 1696197
Blocks: 1687978 1691129
TreeView+ depends on / blocked
 
Reported: 2019-03-20 22:59 UTC by Laura Pardo
Modified: 2019-06-11 11:13 UTC (History)
8 users (show)

Fixed In Version: mod_auth_mellon 0.14.2
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
Clone Of:
Environment:
Last Closed: 2019-06-10 10:51:33 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:0746 None None None 2019-04-11 11:57:41 UTC
Red Hat Product Errata RHSA-2019:0766 None None None 2019-04-16 14:40:29 UTC
Red Hat Product Errata RHSA-2019:0985 None None None 2019-05-07 04:20:37 UTC

Description Laura Pardo 2019-03-20 22:59:03 UTC
A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1576719

Upstream Patch:
https://github.com/Uninett/mod_auth_mellon/pull/196

Comment 1 Laura Pardo 2019-03-20 23:17:50 UTC
Created mod_auth_mellon tracking bugs for this issue:

Affects: fedora-all [bug 1691136]

Comment 6 Riccardo Schirone 2019-04-04 07:19:54 UTC
Statement:

This issue did not affect the versions of mod_auth_mellon as shipped with Red Hat Enterprise Linux 6 as they did not include support for ECP.

Comment 8 Doran Moppert 2019-04-11 04:33:15 UTC
External References:

https://github.com/Uninett/mod_auth_mellon/pull/196

Comment 9 errata-xmlrpc 2019-04-11 11:57:39 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS

Via RHSA-2019:0746 https://access.redhat.com/errata/RHSA-2019:0746

Comment 11 errata-xmlrpc 2019-04-16 14:40:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:0766 https://access.redhat.com/errata/RHSA-2019:0766

Comment 15 Jakub Hrozek 2019-05-02 13:40:21 UTC
*** Bug 1576719 has been marked as a duplicate of this bug. ***

Comment 16 errata-xmlrpc 2019-05-07 04:20:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2019:0985 https://access.redhat.com/errata/RHSA-2019:0985


Note You need to log in before you can comment on or make changes to this bug.