Show plain JSON{"containers": {"cna": {"affected": [{"product": "Drupal 8 miniOrange SAML SP", "vendor": "Xecuify", "versions": [{"lessThan": "30.5", "status": "affected", "version": "miniOrange Premium", "versionType": "custom"}, {"lessThan": "20.3", "status": "affected", "version": "miniOrange Standard", "versionType": "custom"}, {"lessThan": "40.4", "status": "affected", "version": "miniOrange Enterprise", "versionType": "custom"}]}, {"product": "Drupal 9 miniOrange SAML SP", "vendor": "Xecuify", "versions": [{"lessThan": "30.5", "status": "affected", "version": "miniOrange Premium", "versionType": "custom"}, {"lessThan": "20.3", "status": "affected", "version": "miniOrange Standard", "versionType": "custom"}, {"lessThan": "40.4", "status": "affected", "version": "miniOrange Enterprise", "versionType": "custom"}]}, {"product": "Drupal 7 miniOrange SAML SP", "vendor": "Xecuify", "versions": [{"lessThan": "30.2", "status": "affected", "version": "miniOrange Premium", "versionType": "custom"}, {"lessThan": "20.2", "status": "affected", "version": "miniOrange Standard", "versionType": "custom"}, {"lessThan": "40.2", "status": "affected", "version": "miniOrange Enterprise", "versionType": "custom"}]}], "descriptions": [{"lang": "en", "value": "Xecurify's miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"description": "Authentication Bypass via SAML Manipulation", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2022-07-03T18:25:09", "orgId": "2c85b837-eb8b-40ed-9d74-228c62987387", "shortName": "drupal"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"}], "solutions": [{"lang": "en", "value": "The open source version of this module is not impacted. \n\nFor Drupal 8/9:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.5 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.3 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.4 or higher. \n\nFor Drupal 7:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.2 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.2 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.2 or higher. \n\nAll users should ensure certificate and SAML signature enforcement are enabled. "}], "source": {"discovery": "INTERNAL"}, "title": "miniOrange SAML Authentication Bypass", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@drupal.org", "ID": "CVE-2022-26493", "STATE": "PUBLIC", "TITLE": "miniOrange SAML Authentication Bypass"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Drupal 8 miniOrange SAML SP", "version": {"version_data": [{"version_affected": "<", "version_name": "miniOrange Premium", "version_value": "30.5"}, {"version_affected": "<", "version_name": "miniOrange Standard", "version_value": "20.3"}, {"version_affected": "<", "version_name": "miniOrange Enterprise", "version_value": "40.4"}]}}, {"product_name": "Drupal 9 miniOrange SAML SP", "version": {"version_data": [{"version_affected": "<", "version_name": "miniOrange Premium", "version_value": "30.5"}, {"version_affected": "<", "version_name": "miniOrange Standard", "version_value": "20.3"}, {"version_affected": "<", "version_name": "miniOrange Enterprise", "version_value": "40.4"}]}}, {"product_name": "Drupal 7 miniOrange SAML SP", "version": {"version_data": [{"version_affected": "<", "version_name": "miniOrange Premium", "version_value": "30.2"}, {"version_affected": "<", "version_name": "miniOrange Standard", "version_value": "20.2"}, {"version_affected": "<", "version_name": "miniOrange Enterprise", "version_value": "40.2"}]}}]}, "vendor_name": "Xecuify"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Xecurify's miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Authentication Bypass via SAML Manipulation"}]}]}, "references": {"reference_data": [{"name": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html", "refsource": "MISC", "url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"}]}, "solution": [{"lang": "en", "value": "The open source version of this module is not impacted. \n\nFor Drupal 8/9:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.5 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.3 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.4 or higher. \n\nFor Drupal 7:\nminiOrange Premium users should upgrade their miniOrange modules to version 30.2 or higher. \nminiOrange Standard users should upgrade their miniOrange modules to version 20.2 or higher. \nminiOrange Enterprise users should upgrade their miniOrange modules to version 40.2 or higher. \n\nAll users should ensure certificate and SAML signature enforcement are enabled. "}], "source": {"discovery": "INTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T05:03:32.967Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://rafarmerjr1.github.io/2022/06/13/SAML-miniOrange.html"}]}]}, "cveMetadata": {"assignerOrgId": "2c85b837-eb8b-40ed-9d74-228c62987387", "assignerShortName": "drupal", "cveId": "CVE-2022-26493", "datePublished": "2022-06-03T16:00:14", "dateReserved": "2022-03-06T00:00:00", "dateUpdated": "2024-08-03T05:03:32.967Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}