OpenID authentication bypass in Drupal - #VU493
Published: September 16, 2016
Vulnerability identifier: #VU493
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-592
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Drupal
Affected software:
Drupal
Drupal
Detailed vulnerability description
The vulnerability allows malicious sites to access users accounts on the sites using the OpenID module.
The weakness is caused by improper OpenID 2.0 protocol verification that allows malicious sites to steal users credentials, get permission from OpenID provider and obtain accounts of people whose data were stolen.
Successful exploitation of the vulnerability leads to hijack of users credentials and access to their accounts containing personal information.
The weakness is caused by improper OpenID 2.0 protocol verification that allows malicious sites to steal users credentials, get permission from OpenID provider and obtain accounts of people whose data were stolen.
Successful exploitation of the vulnerability leads to hijack of users credentials and access to their accounts containing personal information.
Remediation
Update to 6.18.
http://ftp.drupal.org/files/projects/drupal-6.18.tar.gz
Update to 6.19.
http://ftp.drupal.org/files/projects/drupal-6.19.tar.gz
http://ftp.drupal.org/files/projects/drupal-6.18.tar.gz
Update to 6.19.
http://ftp.drupal.org/files/projects/drupal-6.19.tar.gz