Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2012-091
HistoryJun 06, 2012 - 12:00 a.m.

SA-CONTRIB-2012-091 - Token Authentication - Access bypass

2012-06-0600:00:00
Drupal Security Team
www.drupal.org
5

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

The Token Authentication module provides a token for use in the URL to authenticate users to a site.
Under certain uncommon situations, the module may not revert a user’s session properly. Depending on how tokenauth is used, this could result in subsequent requests being performed as a user with additional privileges when they shouldn’t.

CVE: CVE-2012-2720

Versions affected

  • Tokenauth 6.x-1.x versions prior to 6.x-1.7.

Drupal core is not affected. If you do not use the contributed Token Authentication module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Tokenauth project page.

Reported by

Fixed by

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2012-091