Vulnerability Description
lib/Auth/Source/External.php in the drupalauth module before 1.2.2 for simpleSAMLphp allows remote attackers to authenticate as an arbitrary user via the user name (uid) in a cookie.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Drupalauth Project | Drupalauth | <= 1.2.1 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2013/11/05/1Patch
- http://www.openwall.com/lists/oss-security/2013/11/08/6Patch
- https://code.google.com/p/drupalauth/issues/detail?id=9PatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2013/11/05/1Patch
- http://www.openwall.com/lists/oss-security/2013/11/08/6Patch
- https://code.google.com/p/drupalauth/issues/detail?id=9PatchVendor Advisory
FAQ
What is CVE-2013-4552?
CVE-2013-4552 is a vulnerability with a CVSS score of 7.5 (HIGH). lib/Auth/Source/External.php in the drupalauth module before 1.2.2 for simpleSAMLphp allows remote attackers to authenticate as an arbitrary user via the user name (uid) in a cookie.
How severe is CVE-2013-4552?
CVE-2013-4552 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4552?
Check the references section above for vendor advisories and patch information. Affected products include: Drupalauth Project Drupalauth.