{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3878", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "uninett", "product": { "product_data": [ { "product_name": "mod_auth_mellon", "version": { "version_data": [ { "version_value": "before v0.14.2" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-305" } ] } ] }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3878", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3878", "refsource": "CONFIRM" }, { "url": "https://github.com/Uninett/mod_auth_mellon/pull/196", "name": "https://github.com/Uninett/mod_auth_mellon/pull/196", "refsource": "CONFIRM" }, { "refsource": "UBUNTU", "name": "USN-3924-1", "url": "https://usn.ubuntu.com/3924-1/" }, { "refsource": "FEDORA", "name": "FEDORA-2019-db1e9b3002", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNW5YMC5TLWVWNJEY6AIWNSNPRAMWPQJ/" }, { "refsource": "FEDORA", "name": "FEDORA-2019-2d8ee47f61", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7NLAU7KROWNTHAYSA2S67X347F42L2I/" }, { "refsource": "REDHAT", "name": "RHSA-2019:0746", "url": "https://access.redhat.com/errata/RHSA-2019:0746" }, { "refsource": "REDHAT", "name": "RHSA-2019:0766", "url": "https://access.redhat.com/errata/RHSA-2019:0766" }, { "refsource": "REDHAT", "name": "RHSA-2019:0985", "url": "https://access.redhat.com/errata/RHSA-2019:0985" }, { "refsource": "REDHAT", "name": "RHBA-2019:0959", "url": "https://access.redhat.com/errata/RHBA-2019:0959" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication." } ] }, "impact": { "cvss": [ [ { "vectorString": "8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ] ] } }