Description

Shibboleth Authentication module allows users to log in and get permissions based on federated (SAML2) authentication.

The roles that are assigned to users are based on a matching list. A malicious attacker can delete matching rules from the list by getting the administrator's browser to make a request to a specially-crafted URL while the administrator is logged in.

CVE identifier(s) issued

  • CVE-2015-3375

Versions affected

  • Shibboleth Authentication 6.x-4.x versions prior to 6.x-4.1.
  • Shibboleth Authentication 7.x-4.x versions prior to 7.x-4.1.

Drupal core is not affected. If you do not use the contributed Shibboleth authentication module,
there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Shibboleth Authentication module for Drupal 6.x, upgrade to 6.x-4.1
  • If you use the Shibboleth Authentication module for Drupal 7.x, upgrade to 7.x-4.1

Also see the Shibboleth authentication project page.

Reported by

  • Pere Orga provisional member of the Drupal Security Team

Fixed by

Coordinated by

  • Pere Orga provisional member of the Drupal Security Team

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity