View online: https://www.drupal.org/sa-contrib-2021-001
Project: Open Social [1] Version: 8.x-9.x-dev8.x-8.x-dev Date: 2021-January-27 Security risk: *Moderately critical* 12∕25 AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2] Vulnerability: Access bypass
Description: The optional Social Auth Extra module enables you to use the single sign-on methods provided by Open Social e.g. Facebook, LinkedIn, Google and Twitter.
The module doesn't implement a proper cache strategy for anonymous users allowing the registration form to be cached with disclosed information in certain scenarios. The information is usually only available for logged-in users of the community.
This vulnerability is mitigated by the fact that social_auth_extra needs to be enabled, one of the single sign-on methods needs to be configured. There is no impact for regular registration without single sign-on.
Removing the single sign-on providers from configuration will allow this vulnerability to be blocked.
Solution: Install the latest version:
* If you use Open Social major version 8, upgrade to 8.x-8.10 [3] * If you use Open Social major version 9, upgrade to 8.x-9.8 [4]
Reported By: * Alexander Varwijk [5]
Fixed By: * Alexander Varwijk [6] * Ronald te Brake [7]
Coordinated By: * Greg Knaddison [8] of the Drupal Security Team
[1] https://www.drupal.org/project/social [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/social/releases/8.x-8.10 [4] https://www.drupal.org/project/social/releases/8.x-9.8 [5] https://www.drupal.org/user/1868952 [6] https://www.drupal.org/user/1868952 [7] https://www.drupal.org/user/2314038 [8] https://www.drupal.org/user/36762