Search criteria Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.

1 vulnerability by Xecuify

CVE-2022-26493 (GCVE-0-2022-26493)

Vulnerability from cvelistv5 – Published: 2022-06-03 16:00 – Updated: 2024-08-03 05:03
VLAI?
Title
miniOrange SAML Authentication Bypass
Summary
Xecurify's miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9.
CWE
  • Authentication Bypass via SAML Manipulation
Assigner
References
Impacted products
Vendor Product Version
Xecuify Drupal 8 miniOrange SAML SP Affected: miniOrange Premium , < 30.5 (custom)
Affected: miniOrange Standard , < 20.3 (custom)
Affected: miniOrange Enterprise , < 40.4 (custom)
Create a notification for this product.
    Xecuify Drupal 9 miniOrange SAML SP Affected: miniOrange Premium , < 30.5 (custom)
Affected: miniOrange Standard , < 20.3 (custom)
Affected: miniOrange Enterprise , < 40.4 (custom)
Create a notification for this product.
    Xecuify Drupal 7 miniOrange SAML SP Affected: miniOrange Premium , < 30.2 (custom)
Affected: miniOrange Standard , < 20.2 (custom)
Affected: miniOrange Enterprise , < 40.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:03:32.967Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Drupal 8 miniOrange SAML SP",
          "vendor": "Xecuify",
          "versions": [
            {
              "lessThan": "30.5",
              "status": "affected",
              "version": "miniOrange Premium",
              "versionType": "custom"
            },
            {
              "lessThan": "20.3",
              "status": "affected",
              "version": "miniOrange Standard",
              "versionType": "custom"
            },
            {
              "lessThan": "40.4",
              "status": "affected",
              "version": "miniOrange Enterprise",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Drupal 9 miniOrange SAML SP",
          "vendor": "Xecuify",
          "versions": [
            {
              "lessThan": "30.5",
              "status": "affected",
              "version": "miniOrange Premium",
              "versionType": "custom"
            },
            {
              "lessThan": "20.3",
              "status": "affected",
              "version": "miniOrange Standard",
              "versionType": "custom"
            },
            {
              "lessThan": "40.4",
              "status": "affected",
              "version": "miniOrange Enterprise",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Drupal 7 miniOrange SAML SP",
          "vendor": "Xecuify",
          "versions": [
            {
              "lessThan": "30.2",
              "status": "affected",
              "version": "miniOrange Premium",
              "versionType": "custom"
            },
            {
              "lessThan": "20.2",
              "status": "affected",
              "version": "miniOrange Standard",
              "versionType": "custom"
            },
            {
              "lessThan": "40.2",
              "status": "affected",
              "version": "miniOrange Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Xecurify\u0027s miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Authentication Bypass via SAML Manipulation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-03T18:25:09.000Z",
        "orgId": "2c85b837-eb8b-40ed-9d74-228c62987387",
        "shortName": "drupal"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The open source version of this module is not impacted. \n\nFor Drupal 8/9:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.5 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.3 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.4 or higher. \n\nFor Drupal 7:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.2 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.2 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.2 or higher. \n\nAll users should ensure certificate and SAML signature enforcement are enabled."
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "miniOrange SAML Authentication Bypass",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@drupal.org",
          "ID": "CVE-2022-26493",
          "STATE": "PUBLIC",
          "TITLE": "miniOrange SAML Authentication Bypass"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Drupal 8 miniOrange SAML SP",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Premium",
                            "version_value": "30.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Standard",
                            "version_value": "20.3"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Enterprise",
                            "version_value": "40.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Drupal 9 miniOrange SAML SP",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Premium",
                            "version_value": "30.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Standard",
                            "version_value": "20.3"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Enterprise",
                            "version_value": "40.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Drupal 7 miniOrange SAML SP",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Premium",
                            "version_value": "30.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Standard",
                            "version_value": "20.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "miniOrange Enterprise",
                            "version_value": "40.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Xecuify"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Xecurify\u0027s miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Authentication Bypass via SAML Manipulation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html",
              "refsource": "MISC",
              "url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "The open source version of this module is not impacted. \n\nFor Drupal 8/9:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.5 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.3 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.4 or higher. \n\nFor Drupal 7:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.2 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.2 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.2 or higher. \n\nAll users should ensure certificate and SAML signature enforcement are enabled."
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2c85b837-eb8b-40ed-9d74-228c62987387",
    "assignerShortName": "drupal",
    "cveId": "CVE-2022-26493",
    "datePublished": "2022-06-03T16:00:14.000Z",
    "dateReserved": "2022-03-06T00:00:00.000Z",
    "dateUpdated": "2024-08-03T05:03:32.967Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}