First published: Wed Jul 01 2009(Updated: )
Unspecified vulnerability in LoginToboggan 6.x-1.x before 6.x-1.5, a module for Drupal, when "Allow users to login using their e-mail address" is enabled, allows remote blocked users to bypass intended access restrictions via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal | ||
Logintoboggan | =6.x-1.0 | |
Logintoboggan | =6.x-1.1 | |
Logintoboggan | =6.x-1.2 | |
Logintoboggan | =6.x-1.3 | |
Logintoboggan | =6.x-1.4 | |
Logintoboggan | =6.x-1.x | |
Logintoboggan | =6.x-2.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2291 is classified as a critical severity vulnerability due to the risk of unauthorized access to blocked accounts.
To fix CVE-2009-2291, update the LoginToboggan module to version 6.x-1.5 or later.
CVE-2009-2291 affects Drupal sites using LoginToboggan version 6.x-1.0 to 6.x-1.4 with the email login feature enabled.
CVE-2009-2291 allows remote blocked users to bypass access restrictions and log in using their email address.
CVE-2009-2291 was disclosed in July 2009.