CVE-2019-3877

A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
Open Redirect
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
redhatCNA
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 36%
VendorProductVersion
mod_auth_mellon_projectmod_auth_mellon
𝑥
< 0.14.2
redhatenterprise_linux
7.0
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libapache2-mod-auth-mellon
bullseye
0.17.0-1+deb11u1
fixed
jessie
no-dsa
bookworm
0.18.1-1
fixed
sid
0.19.1-1
fixed
trixie
0.19.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libapache2-mod-auth-mellon
groovy
Fixed 0.14.2-1ubuntu1
released
focal
Fixed 0.14.2-1ubuntu1
released
eoan
Fixed 0.14.2-1ubuntu1
released
disco
Fixed 0.14.2-1ubuntu1
released
cosmic
Fixed 0.14.0-1ubuntu0.1
released
bionic
Fixed 0.13.1-1ubuntu0.1
released
xenial
Fixed 0.12.0-2+deb9u1build0.16.04.1
released
trusty
dne