First published: Thu Sep 20 2012(Updated: )
Cross-site request forgery (CSRF) vulnerability in the Password Policy module before 6.x-1.4 and 7.x-1.0 beta3 for Drupal allows remote attackers to hijack the authentication of administrative users for requests that unblock a user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Erikwebb Password Policy | =6.x-1.0 | |
Erikwebb Password Policy | =6.x-1.0-alpha2 | |
Erikwebb Password Policy | =6.x-1.0-alpha3 | |
Erikwebb Password Policy | =6.x-1.0-alpha4 | |
Erikwebb Password Policy | =6.x-1.0-beta1 | |
Erikwebb Password Policy | =6.x-1.1 | |
Erikwebb Password Policy | =6.x-1.2 | |
Erikwebb Password Policy | =6.x-1.3 | |
Erikwebb Password Policy | =7.x-1.0-beta3 | |
Drupal Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-1633 is classified as moderate due to the potential for administrative user authentication hijacking.
To fix CVE-2012-1633, update the Password Policy module to version 6.x-1.4 or 7.x-1.0 beta4 or later.
CVE-2012-1633 affects the Password Policy module versions prior to 6.x-1.4 and 7.x-1.0 beta4.
CVE-2012-1633 is a Cross-site request forgery (CSRF) vulnerability.
Yes, CVE-2012-1633 can be exploited remotely by attackers to hijack the authentication of administrative users.