Drupal 6.x < 6.36 OpenID Security Bypass

medium Nessus Network Monitor Plugin ID 9214

Synopsis

The remote web server is hosting an outdated installation of Drupal that is vulnerable to multiple attack vectors.

Description

The remote web server is running a version of Drupal that is 6.x prior to 6.36. It is, therefore, potentially affected by a security bypass vulnerability due to a flaw in the OpenID module. A remote attacker can exploit this flaw to log in as other users, including administrators. Note that victims must have an existing OpenID account from a particular set of OpenID providers including, but not limited to, Verisign, LiveJournal, or StackExchange.

Solution

Upgrade to Drupal 6.36, or later.

See Also

https://www.drupal.org/SA-CORE-2015-002

https://www.drupal.org/drupal-6.36-release-notes

https://www.drupal.org/security

Plugin Details

Severity: Medium

ID: 9214

Family: CGI

Published: 4/8/2016

Updated: 3/6/2019

Nessus ID: 84291

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:drupal:drupal

Patch Publication Date: 6/17/2015

Vulnerability Publication Date: 6/17/2015

Reference Information

CVE: CVE-2015-3234

BID: 75294