MEDIUM · 5.8

CVE-2019-3877

A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browse...

Vulnerability Description

A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.

CVSS Score

5.8

MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
Mod Auth Mellon ProjectMod Auth Mellon< 0.14.2
FedoraprojectFedora29
RedhatEnterprise Linux7.0
CanonicalUbuntu Linux18.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-3877?

CVE-2019-3877 is a vulnerability with a CVSS score of 5.8 (MEDIUM). A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browse...

How severe is CVE-2019-3877?

CVE-2019-3877 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-3877?

Check the references section above for vendor advisories and patch information. Affected products include: Mod Auth Mellon Project Mod Auth Mellon, Fedoraproject Fedora, Redhat Enterprise Linux, Canonical Ubuntu Linux.