[Security-news] OAuth2 Client - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-013

security-news at drupal.org security-news at drupal.org
Wed Feb 5 17:29:27 UTC 2025


View online: https://www.drupal.org/sa-contrib-2025-013

Project: OAuth2 Client [1]
Date: 2025-February-05
Security risk: *Moderately critical* 12 ∕ 25
AC:Complex/A:None/CI:None/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross Site Request Forgery

Affected versions: <4.1.3
Description: 
This module enables a developer to create dedicated OAuth2 clients for
connecting to external APIs and other OAuth protected resources.

The module does not use Cross Site Request Forgery (CSRF) tokens to protect
routes for enabling a client.

This vulnerability is mitigated by the fact that an attacker must know the
machine name of the client and deceive another user with this permission.

Solution: 
Install the latest version:

   * If you use the Oauth2 Client module for Drupal 10 or 11, upgrade to 
Oauth2
     Client 4.1.3 [3]

Reported By: 
   * Tobias Bähr [4]

Fixed By: 
   * Shawn Duncan [5]
   * Tobias Bähr [6]

Coordinated By: 
   * cilefen [7] of the Drupal Security Team
   * Greg Knaddison [8] of the Drupal Security Team


[1] https://www.drupal.org/project/oauth2_client
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/oauth2_client/releases/4.1.3
[4] https://www.drupal.org/user/183956
[5] https://www.drupal.org/user/628748
[6] https://www.drupal.org/user/183956
[7] https://www.drupal.org/u/cilefen
[8] https://www.drupal.org/user/36762



More information about the Security-news mailing list