View online: https://www.drupal.org/sa-contrib-2024-044
Project: Persistent Login [1] Date: 2024-October-02 Security risk: *Moderately critical* 11 ∕ 25 AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:All [2] Vulnerability: Access bypass
Affected versions: <1.8.0 || >=2.2.0 <2.2.2 || 2.0.* || 2.1.* Description: This module enables users to remain logged in separately from session timeouts.
The module doesn't sufficiently check a user's disabled status when validating cookies.
This vulnerability is mitigated by the fact that an attacker must have an unexpired cookie from a previous successful login.
Solution: Install the latest version:
* If you use the Persistent Login 8.x-1.x, upgrade to Persistent Login 8.x-1.8 [3] * If you use the Persistent Login 2.x, upgrade to Persistent Login 2.2.2 [4]
Reported By: * Geoff Appleby [5]
Fixed By: * Geoff Appleby [6]
Coordinated By: * Greg Knaddison [7] of the Drupal Security Team * Juraj Nemec [8] of the Drupal Security Team * Drew Webber [9] of the Drupal Security Team
[1] https://www.drupal.org/project/persistent_login [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/persistent_login/releases/8.x-1.8 [4] https://www.drupal.org/project/persistent_login/releases/2.2.2 [5] https://www.drupal.org/user/490940 [6] https://www.drupal.org/user/490940 [7] https://www.drupal.org/u/greggles [8] https://www.drupal.org/u/poker10 [9] https://www.drupal.org/u/mcdruid