CVE-2013-4552

lib/Auth/Source/External.php in the drupalauth module before 1.2.2 for simpleSAMLphp allows remote attackers to authenticate as an arbitrary user via the user name (uid) in a cookie.
Configurations

Configuration 1 (hide)

cpe:2.3:a:drupalauth_project:drupalauth:*:-:-:*:-:simplesamlphp:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2013/11/05/1 - Patch () http://www.openwall.com/lists/oss-security/2013/11/05/1 - Patch
References () http://www.openwall.com/lists/oss-security/2013/11/08/6 - Patch () http://www.openwall.com/lists/oss-security/2013/11/08/6 - Patch
References () https://code.google.com/p/drupalauth/issues/detail?id=9 - Patch, Vendor Advisory () https://code.google.com/p/drupalauth/issues/detail?id=9 - Patch, Vendor Advisory

Information

Published : 2014-05-13 15:55

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4552

Mitre link : CVE-2013-4552

CVE.ORG link : CVE-2013-4552


JSON object : View

Products Affected

drupalauth_project

  • drupalauth
CWE
CWE-287

Improper Authentication