CVE-2019-13038

EUVD-2019-4603
mod_auth_mellon through 0.14.2 has an Open Redirect via the login?ReturnTo= substring, as demonstrated by omitting the // after http: in the target URL.
Open Redirect
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 30%
Affected Products (NVD)
VendorProductVersion
mod_auth_mellon_projectmod_auth_mellon
𝑥
≤ 0.14.2
oraclezfs_storage_appliance_kit
8.8
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libapache2-mod-auth-mellon
bookworm
0.18.1-1
fixed
bullseye
0.17.0-1+deb11u1
fixed
jessie
ignored
sid
0.19.1-1
fixed
stretch
no-dsa
trixie
0.19.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libapache2-mod-auth-mellon
bionic
Fixed 0.13.1-1ubuntu0.2
released
cosmic
ignored
disco
ignored
eoan
Fixed 0.14.2-1ubuntu1.19.10.1
released
focal
Fixed 0.14.2-1ubuntu2
released
groovy
Fixed 0.14.2-1ubuntu2
released
hirsute
Fixed 0.14.2-1ubuntu2
released
impish
Fixed 0.14.2-1ubuntu2
released
jammy
Fixed 0.14.2-1ubuntu2
released
kinetic
Fixed 0.14.2-1ubuntu2
released
lunar
Fixed 0.14.2-1ubuntu2
released
mantic
Fixed 0.14.2-1ubuntu2
released
noble
Fixed 0.14.2-1ubuntu2
released
trusty
dne
xenial
needed