- Advisory ID: DRUPAL-SA-2006-019
- Project: Pubcookie 4.6, 4.7
- Date: 2006-Sep-8
- Security risk: highly critical
- Exploitable from: remote
- Vulnerability: security bypass
Description
It is possible for a malicious user to spoof a user's identity by bypassing the login redirection mechanism in the pubcookie module. The malicious user may gain the privileges of the user they are spoofing, including the administrative user.
Versions affected
Drupal core is not affected. If you do not use the pubcookie module (which provides single sign-on for organizations using pubcookie), there is nothing you need to do.
If you are running pubcookie, Please check the CVS $Id$ fields on the second line of the file pubcookie.module to determine whether the version you are running is vulnerable. Versions older than the following are vulnerable:
- Drupal 4.6 - // $Id: pubcookie.module,v 1.2.2.4 2006/09/07 01:44:11 jvandyk Exp $
- Drupal 4.7 - // $Id: pubcookie.module,v 1.6.2.1 2006/09/06 22:43:31 jvandyk Exp $
Solution
Install the latest version:
See also the pubcookie project page.
Reported by
Eric Drechsel.
Contact
The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.