[Security-news] Persistent Login - Moderately critical - Access bypass - SA-CONTRIB-2024-044

security-news at drupal.org security-news at drupal.org
Wed Oct 2 18:05:30 UTC 2024


View online: https://www.drupal.org/sa-contrib-2024-044

Project: Persistent Login [1]
Date: 2024-October-02
Security risk: *Moderately critical* 11 ∕ 25
AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:All [2]
Vulnerability: Access bypass

Affected versions: <1.8.0 || >=2.2.0 <2.2.2 || 2.0.* || 2.1.*
Description: 
This module enables users to remain logged in separately from session
timeouts.

The module doesn't sufficiently check a user's disabled status when
validating cookies.

This vulnerability is mitigated by the fact that an attacker must have an
unexpired cookie from a previous successful login.

Solution: 
Install the latest version:

   * If you use the Persistent Login 8.x-1.x, upgrade to Persistent Login
     8.x-1.8 [3]
   * If you use the Persistent Login 2.x, upgrade to Persistent Login 2.2.2 
[4]

Reported By: 
   * Geoff Appleby [5]

Fixed By: 
   * Geoff Appleby [6]

Coordinated By: 
   * Greg Knaddison [7] of the Drupal Security Team
   * Juraj Nemec [8] of the Drupal Security Team
   * Drew Webber [9] of the Drupal Security Team


[1] https://www.drupal.org/project/persistent_login
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/persistent_login/releases/8.x-1.8
[4] https://www.drupal.org/project/persistent_login/releases/2.2.2
[5] https://www.drupal.org/user/490940
[6] https://www.drupal.org/user/490940
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/u/poker10
[9] https://www.drupal.org/u/mcdruid



More information about the Security-news mailing list