[Security-news] Password Reset Landing Page (PRLP) - Highly critical - Access bypass - SA-CONTRIB-2020-021

security-news at drupal.org security-news at drupal.org
Wed May 27 16:50:50 UTC 2020


View online: https://www.drupal.org/sa-contrib-2020-021

Project: Password Reset Landing Page (PRLP) [1]
Date: 2020-May-27
Security risk: *Highly critical* 20∕25
AC:Basic/A:None/CI:All/II:All/E:Theoretical/TD:All [2]
Vulnerability: Access bypass

Description: 
This module enables you to force a password update when using password reset
link.
The module doesn't sufficiently validate the login URL allowing a malicious
user to use a specially crafted URL to log in as another user.

Solution: 
Install the latest version:

   * If you use the PRLP module for Drupal 8.x, upgrade to PRLP 8.x-1.5 [3]

Also see the Password Reset Landing Page (PRLP) [4] project page.

Reported By: 
   * Kyle Einecker  [5]
   * Seth Hill  [6]

Fixed By: 
   * Joseph Purcell  [7]
   * Jitesh Doshi  [8]
   * Christian Crawford  [9]
   * Kyle Einecker  [10]

Coordinated By: 
   * Greg Knaddison [11] of the Drupal Security Team


[1] https://www.drupal.org/project/prlp
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/prlp/releases/8.x-1.5
[4] https://www.drupal.org/project/prlp
[5] https://www.drupal.org/user/2824963
[6] https://www.drupal.org/user/676480
[7] https://www.drupal.org/user/2944035
[8] https://www.drupal.org/user/1799550
[9] https://www.drupal.org/user/2888131
[10] https://www.drupal.org/user/2824963
[11] https://www.drupal.org/user/36762



More information about the Security-news mailing list