mod_auth_mellon before 0.13.1 is vulnerable to a Cross-Site Session Transfer attack, where a user with access to one web site running on a server can copy their session cookie to a different web site on the same server to get access to that site.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/UNINETT/mod_auth_mellon/releases/tag/v0.13.1 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/96843 | vdb entry |
https://sympa.uninett.no/lists/uninett.no/arc/modmellon/2017-03/msg00008.html | not applicable |