Bug 1204744 (CVE-2015-2559) - CVE-2015-2559 drupal: access bypass via password reset URLs
Summary: CVE-2015-2559 drupal: access bypass via password reset URLs
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2015-2559
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-03-23 12:56 UTC by Martin Prpič
Modified: 2019-09-29 13:30 UTC (History)
6 users (show)

Fixed In Version: Drupal 6.35, Drupal 7.35
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-03-23 12:57:27 UTC
Embargoed:


Attachments (Terms of Use)

Description Martin Prpič 2015-03-23 12:56:05 UTC
The following flaw was reported in Drupal:

Password reset URLs can be forged under certain circumstances, allowing an attacker to gain access to another user's account without knowing the account's password.

In Drupal 7, this vulnerability is mitigated by the fact that it can only be exploited on sites where accounts have been imported or programmatically edited in a way that results in the password hash in the database being the same for multiple user accounts. In Drupal 6, it can additionally be exploited on sites where administrators have created multiple new user accounts with the same password via the administrative interface, or where accounts have been imported or programmatically edited in a way that results in the password hash in the database being empty for at least one user account.

Drupal 6 sites that have empty password hashes, or a password field with a guessable string in the database, are especially prone to this vulnerability. This could apply to sites that use external authentication so that the password field is set to a fixed, invalid value.

Upstream advisory:

https://www.drupal.org/SA-CORE-2015-001
https://www.drupal.org/node/2455005

Upstream patch:

http://cgit.drupalcode.org/drupal/commit/?id=8e54eca05a65c6231b02510e1917af0c9191e549

CVE assignment:

http://seclists.org/oss-sec/2015/q1/891

Comment 1 Martin Prpič 2015-03-23 12:57:27 UTC
This flaw was fixed via:

FEDORA-EPEL-2015-1319  [98]drupal7-7.35-1.el6
FEDORA-EPEL-2015-1335  [101]drupal7-7.35-1.el7
FEDORA-2015-4315       [104]drupal7-7.35-1.fc20
FEDORA-2015-4340       [107]drupal7-7.35-1.fc21
FEDORA-2015-4244       [110]drupal7-7.35-1.fc22

FEDORA-EPEL-2015-1344  [98]drupal6-6.35-1.el5
FEDORA-EPEL-2015-1346  [101]drupal6-6.35-1.el6
FEDORA-2015-4394       [104]drupal6-6.35-1.fc20
FEDORA-2015-4372       [107]drupal6-6.35-1.fc21
FEDORA-2015-4366       [110]drupal6-6.35-1.fc22


Note You need to log in before you can comment on or make changes to this bug.