A vulnerability was found in modauthmellon before v0.14.2. If Apache is configured as a reverse proxy and modauthmellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.12.0-2+deb9u1build0.16.04.1", "binary_name": "libapache2-mod-auth-mellon" }, { "binary_version": "0.12.0-2+deb9u1build0.16.04.1", "binary_name": "libapache2-mod-auth-mellon-dbgsym" } ] }