SB2019041616 - Red Hat Enterprise Linux 7 update for mod_auth_mellon 



SB2019041616 - Red Hat Enterprise Linux 7 update for mod_auth_mellon

Published: April 16, 2019 Updated: April 24, 2025

Security Bulletin ID SB2019041616
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Open redirect (CVE-ID: CVE-2019-3877)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data in the apr_uri_parse() function within the logout URL. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.


2) Improper Authentication (CVE-ID: CVE-2019-3878)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error when processing certain headers. A remote attacker can add special HTTP headers that are normally used to start the special SAML ECP, bypass authentication process and gain unauthorized access to the application.

Successful exploitation of the vulnerability requires that Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users.


Remediation

Install update from vendor's website.