Blame SOURCES/0005-CVE_2019_13038.patch

fd3619
From 297093e6a48a4c0fd307c2206c59a8c8eb84fb53 Mon Sep 17 00:00:00 2001
fd3619
From: Valentin <awakenine@users.noreply.github.com>
fd3619
Date: Fri, 6 Sep 2019 13:30:36 +0300
fd3619
Subject: [PATCH] Update auth_mellon_mode.c
fd3619
fd3619
Fix open redirect CVE-2019-13038
fd3619
---
fd3619
 auth_mellon_util.c | 4 ++++
fd3619
 1 file changed, 4 insertions(+)
fd3619
fd3619
diff --git a/auth_mellon_util.c b/auth_mellon_util.c
fd3619
index fd442f9..7dff61e 100644
fd3619
--- a/auth_mellon_util.c
fd3619
+++ b/auth_mellon_util.c
fd3619
@@ -116,6 +116,10 @@ int am_validate_redirect_url(request_rec *r, const char *url)
fd3619
 
fd3619
     /* Sanity check of the scheme of the domain. We only allow http and https. */
fd3619
     if (uri.scheme) {
fd3619
+	/* http and https schemes without hostname are invalid. */
fd3619
+        if (!uri.hostname) {
fd3619
+            return HTTP_BAD_REQUEST;
fd3619
+	}
fd3619
         if (strcasecmp(uri.scheme, "http")
fd3619
             && strcasecmp(uri.scheme, "https")) {
fd3619
             AM_LOG_RERROR(APLOG_MARK, APLOG_ERR, 0, r,
fd3619
-- 
fd3619
2.21.0
fd3619