Amazon Linux AMI : mod_auth_mellon / mod24_auth_mellon (ALAS-2018-968)

medium Nessus Plugin ID 107239

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

Cross-site session transfer vulnerability :

It was found that mod_auth_mellon was vulnerable to a cross-site session transfer attack. An attacker with access to one website on a server could use the same session to get access to a different site running on the same server. (CVE-2017-6807)

Solution

Run 'yum update mod_auth_mellon' to update your system.

Run 'yum update mod24_auth_mellon' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2018-968.html

Plugin Details

Severity: Medium

ID: 107239

File Name: ala_ALAS-2018-968.nasl

Version: 1.2

Type: local

Agent: unix

Published: 3/9/2018

Updated: 4/18/2018

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:mod24_auth_mellon, p-cpe:/a:amazon:linux:mod_auth_mellon, p-cpe:/a:amazon:linux:mod24_auth_mellon-debuginfo, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:mod_auth_mellon-debuginfo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 3/7/2018

Reference Information

CVE: CVE-2017-6807

ALAS: 2018-968