CVE-2022-26493 (GCVE-0-2022-26493)
Vulnerability from cvelistv5 – Published: 2022-06-03 16:00 – Updated: 2024-08-03 05:03
VLAI?
Title
miniOrange SAML Authentication Bypass
Summary
Xecurify's miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9.
Severity ?
9.8 (Critical)
CWE
- Authentication Bypass via SAML Manipulation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Xecuify | Drupal 8 miniOrange SAML SP |
Affected:
miniOrange Premium , < 30.5
(custom)
Affected: miniOrange Standard , < 20.3 (custom) Affected: miniOrange Enterprise , < 40.4 (custom) |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T05:03:32.967Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Drupal 8 miniOrange SAML SP",
"vendor": "Xecuify",
"versions": [
{
"lessThan": "30.5",
"status": "affected",
"version": "miniOrange Premium",
"versionType": "custom"
},
{
"lessThan": "20.3",
"status": "affected",
"version": "miniOrange Standard",
"versionType": "custom"
},
{
"lessThan": "40.4",
"status": "affected",
"version": "miniOrange Enterprise",
"versionType": "custom"
}
]
},
{
"product": "Drupal 9 miniOrange SAML SP",
"vendor": "Xecuify",
"versions": [
{
"lessThan": "30.5",
"status": "affected",
"version": "miniOrange Premium",
"versionType": "custom"
},
{
"lessThan": "20.3",
"status": "affected",
"version": "miniOrange Standard",
"versionType": "custom"
},
{
"lessThan": "40.4",
"status": "affected",
"version": "miniOrange Enterprise",
"versionType": "custom"
}
]
},
{
"product": "Drupal 7 miniOrange SAML SP",
"vendor": "Xecuify",
"versions": [
{
"lessThan": "30.2",
"status": "affected",
"version": "miniOrange Premium",
"versionType": "custom"
},
{
"lessThan": "20.2",
"status": "affected",
"version": "miniOrange Standard",
"versionType": "custom"
},
{
"lessThan": "40.2",
"status": "affected",
"version": "miniOrange Enterprise",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xecurify\u0027s miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Authentication Bypass via SAML Manipulation",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-03T18:25:09.000Z",
"orgId": "2c85b837-eb8b-40ed-9d74-228c62987387",
"shortName": "drupal"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"
}
],
"solutions": [
{
"lang": "en",
"value": "The open source version of this module is not impacted. \n\nFor Drupal 8/9:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.5 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.3 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.4 or higher. \n\nFor Drupal 7:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.2 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.2 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.2 or higher. \n\nAll users should ensure certificate and SAML signature enforcement are enabled."
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "miniOrange SAML Authentication Bypass",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@drupal.org",
"ID": "CVE-2022-26493",
"STATE": "PUBLIC",
"TITLE": "miniOrange SAML Authentication Bypass"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Drupal 8 miniOrange SAML SP",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "miniOrange Premium",
"version_value": "30.5"
},
{
"version_affected": "\u003c",
"version_name": "miniOrange Standard",
"version_value": "20.3"
},
{
"version_affected": "\u003c",
"version_name": "miniOrange Enterprise",
"version_value": "40.4"
}
]
}
},
{
"product_name": "Drupal 9 miniOrange SAML SP",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "miniOrange Premium",
"version_value": "30.5"
},
{
"version_affected": "\u003c",
"version_name": "miniOrange Standard",
"version_value": "20.3"
},
{
"version_affected": "\u003c",
"version_name": "miniOrange Enterprise",
"version_value": "40.4"
}
]
}
},
{
"product_name": "Drupal 7 miniOrange SAML SP",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "miniOrange Premium",
"version_value": "30.2"
},
{
"version_affected": "\u003c",
"version_name": "miniOrange Standard",
"version_value": "20.2"
},
{
"version_affected": "\u003c",
"version_name": "miniOrange Enterprise",
"version_value": "40.2"
}
]
}
}
]
},
"vendor_name": "Xecuify"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xecurify\u0027s miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Authentication Bypass via SAML Manipulation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html",
"refsource": "MISC",
"url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"
}
]
},
"solution": [
{
"lang": "en",
"value": "The open source version of this module is not impacted. \n\nFor Drupal 8/9:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.5 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.3 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.4 or higher. \n\nFor Drupal 7:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.2 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.2 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.2 or higher. \n\nAll users should ensure certificate and SAML signature enforcement are enabled."
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2c85b837-eb8b-40ed-9d74-228c62987387",
"assignerShortName": "drupal",
"cveId": "CVE-2022-26493",
"datePublished": "2022-06-03T16:00:14.000Z",
"dateReserved": "2022-03-06T00:00:00.000Z",
"dateUpdated": "2024-08-03T05:03:32.967Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:saml_sp_2.0_single_sign_on:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"7.x\", \"versionEndIncluding\": \"7.x-2.57\", \"matchCriteriaId\": \"C8F4331D-5CC0-4992-B46D-6504ACCD803D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:saml_sp_2.0_single_sign_on:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.x\", \"versionEndIncluding\": \"8.x-2.24\", \"matchCriteriaId\": \"AC5A17E2-1CB0-4193-9558-8E384568F4BF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Xecurify\u0027s miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9.\"}, {\"lang\": \"es\", \"value\": \"Los m\\u00f3dulos miniOrange Premium, Standard y Enterprise Drupal SAML SP de Xecurify poseen una vulnerabilidad en la autenticaci\\u00f3n y autorizaci\\u00f3n. Un atacante con acceso a un m\\u00e9todo de interceptaci\\u00f3n de peticiones HTTP es capaz de saltarse la autenticaci\\u00f3n y la autorizaci\\u00f3n eliminando la firma de aserci\\u00f3n SAML, suplantando a los usuarios y roles existentes, incluidos los usuarios/roles administrativos. Esta vulnerabilidad no se mitiga configurando el m\\u00f3dulo para reforzar las firmas o las comprobaciones de certificados. Xecurify recomienda actualizar los m\\u00f3dulos de miniOrange a sus versiones m\\u00e1s recientes. Esta vulnerabilidad est\\u00e1 presente en las versiones de pago del producto miniOrange Drupal SAML SP que afecta a Drupal 7, 8 y 9\"}]",
"id": "CVE-2022-26493",
"lastModified": "2024-11-21T06:54:03.060",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"mlhess@drupal.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-06-03T18:15:09.207",
"references": "[{\"url\": \"https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html\", \"source\": \"mlhess@drupal.org\"}, {\"url\": \"https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "mlhess@drupal.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-295\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-26493\",\"sourceIdentifier\":\"mlhess@drupal.org\",\"published\":\"2022-06-03T18:15:09.207\",\"lastModified\":\"2024-11-21T06:54:03.060\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Xecurify\u0027s miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9.\"},{\"lang\":\"es\",\"value\":\"Los m\u00f3dulos miniOrange Premium, Standard y Enterprise Drupal SAML SP de Xecurify poseen una vulnerabilidad en la autenticaci\u00f3n y autorizaci\u00f3n. Un atacante con acceso a un m\u00e9todo de interceptaci\u00f3n de peticiones HTTP es capaz de saltarse la autenticaci\u00f3n y la autorizaci\u00f3n eliminando la firma de aserci\u00f3n SAML, suplantando a los usuarios y roles existentes, incluidos los usuarios/roles administrativos. Esta vulnerabilidad no se mitiga configurando el m\u00f3dulo para reforzar las firmas o las comprobaciones de certificados. Xecurify recomienda actualizar los m\u00f3dulos de miniOrange a sus versiones m\u00e1s recientes. Esta vulnerabilidad est\u00e1 presente en las versiones de pago del producto miniOrange Drupal SAML SP que afecta a Drupal 7, 8 y 9\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"mlhess@drupal.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:saml_sp_2.0_single_sign_on:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.x\",\"versionEndIncluding\":\"7.x-2.57\",\"matchCriteriaId\":\"C8F4331D-5CC0-4992-B46D-6504ACCD803D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:saml_sp_2.0_single_sign_on:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.x\",\"versionEndIncluding\":\"8.x-2.24\",\"matchCriteriaId\":\"AC5A17E2-1CB0-4193-9558-8E384568F4BF\"}]}]}],\"references\":[{\"url\":\"https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html\",\"source\":\"mlhess@drupal.org\"},{\"url\":\"https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…