Bug 786855 (CVE-2012-0825) - CVE-2012-0825 drupal6, drupal7: OpenID SREG and AX attributes weren't verified to be signed (SA-CORE-2012-001)
Summary: CVE-2012-0825 drupal6, drupal7: OpenID SREG and AX attributes weren't verifie...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2012-0825
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-02-02 15:25 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:50 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-03-14 01:25:25 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2012-02-02 15:25:30 UTC
A security flaw was found in the way the OpeID functionality in Drupal, the content management system, performed verification if the attributes passed through OpenID Simple Registration (SREG) and OpenID Attribute Exchange (AX) were signed. A remote attacker could use this flaw to modify user's information without the information add-on being noticed (MITM attack).

References:
[1] http://drupal.org/node/1425084

Comment 1 Jan Lieskovsky 2012-02-02 15:33:03 UTC
This issue is scheduled to be corrected in the following drupal6 package updates:
1) drupal6-6.24-1.el6 	for Fedora EPEL 6,
2) drupal6-6.24-1.el5 	for Fedora EPEL 5,
3) drupal6-6.24-1.fc15 	for Fedora 15, 
4) drupal6-6.24-1.fc16 	for Fedora 16.

Comment 2 Jan Lieskovsky 2012-02-02 15:39:51 UTC
This issue is scheduled to be corrected in the following drupal7 package updates:
1) drupal7-7.12-1.el6 for Fedora EPEL 6,
2) drupal7-7.12-1.el5 for Fedora EPEL 5,
3, drupal7-7.12-1.fc16 	for Fedora 16,
4) drupal7-7.12-1.fc15 	for Fedora 15.

Comment 3 Paul W. Frields 2012-03-14 01:25:25 UTC
These packages have been released for all Fedora and EPEL branches.


Note You need to log in before you can comment on or make changes to this bug.