[Security-news] Open Social - Moderately critical - Access bypass - SA-CONTRIB-2021-001

security-news at drupal.org security-news at drupal.org
Wed Jan 27 18:18:11 UTC 2021


View online: https://www.drupal.org/sa-contrib-2021-001

Project: Open Social [1]
Version: 8.x-9.x-dev8.x-8.x-dev
Date: 2021-January-27
Security risk: *Moderately critical* 12∕25
AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass

Description: 
The optional Social Auth Extra module enables you to use the single sign-on
methods provided by Open Social e.g. Facebook, LinkedIn, Google and Twitter.

The module doesn't implement a proper cache strategy for anonymous users
allowing the registration form to be cached with disclosed information in
certain scenarios. The information is usually only available for logged-in
users of the community.

This vulnerability is mitigated by the fact that social_auth_extra needs to
be enabled, one of the single sign-on methods needs to be configured. There
is no impact for regular registration without single sign-on.

Removing the single sign-on providers from configuration will allow this
vulnerability to be blocked.

Solution: 
Install the latest version:

   * If you use Open Social major version 8, upgrade to  8.x-8.10 [3]
   * If you use Open Social major version 9, upgrade to 8.x-9.8 [4]

Reported By: 
   * Alexander Varwijk [5]

Fixed By: 
   * Alexander Varwijk [6]
   * Ronald te Brake [7]

Coordinated By: 
   * Greg Knaddison [8] of the Drupal Security Team


[1] https://www.drupal.org/project/social
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/social/releases/8.x-8.10
[4] https://www.drupal.org/project/social/releases/8.x-9.8
[5] https://www.drupal.org/user/1868952
[6] https://www.drupal.org/user/1868952
[7] https://www.drupal.org/user/2314038
[8] https://www.drupal.org/user/36762



More information about the Security-news mailing list