CVE-2019-13038

mod_auth_mellon through 0.14.2 has an Open Redirect via the login?ReturnTo= substring, as demonstrated by omitting the // after http: in the target URL.
Open Redirect
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 38%
VendorProductVersion
mod_auth_mellon_projectmod_auth_mellon
𝑥
≤ 0.14.2
oraclezfs_storage_appliance_kit
8.8
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libapache2-mod-auth-mellon
bullseye
0.17.0-1+deb11u1
fixed
stretch
no-dsa
jessie
ignored
bookworm
0.18.1-1
fixed
sid
0.19.1-1
fixed
trixie
0.19.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libapache2-mod-auth-mellon
noble
Fixed 0.14.2-1ubuntu2
released
mantic
Fixed 0.14.2-1ubuntu2
released
lunar
Fixed 0.14.2-1ubuntu2
released
kinetic
Fixed 0.14.2-1ubuntu2
released
jammy
Fixed 0.14.2-1ubuntu2
released
impish
Fixed 0.14.2-1ubuntu2
released
hirsute
Fixed 0.14.2-1ubuntu2
released
groovy
Fixed 0.14.2-1ubuntu2
released
focal
Fixed 0.14.2-1ubuntu2
released
eoan
Fixed 0.14.2-1ubuntu1.19.10.1
released
disco
ignored
cosmic
ignored
bionic
Fixed 0.13.1-1ubuntu0.2
released
xenial
needed
trusty
dne