Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Simple OAuth (OAuth2) & OpenID Connect - Critical - Access bypass - SA-CONTRIB-2025-114

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Simple OAuth (OAuth2) & OpenID Connect - Critical - Access bypass - SA-CONTRIB-2025-114


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Simple OAuth (OAuth2) & OpenID Connect - Critical - Access bypass - SA-CONTRIB-2025-114
  • Date: Wed, 29 Oct 2025 16:44:42 +0000 (UTC)
  • Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=PZKyLqjW; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.133 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org C09D740FF2
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 6735F80F02
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-contrib-2025-114

Project: Simple OAuth (OAuth2) & OpenID Connect [1]
Date: 2025-October-29
Security risk: *Critical* 15 ∕ 25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass

Affected versions: <6.0.7
CVE IDs: CVE-2025-12466
Description: 
This module introduces an OAuth 2.0 authorization server, which can be
configured to protect your Drupal instance with access tokens, or allow
clients to request new access tokens and refresh them.

The module doesn't sufficiently respect granted scopes, it affects all access
checks that are based on roles. For example: routes that have the _role
requirement, can be bypassed with an access token.

This vulnerability is mitigated by the fact that an attacker must have the
access token in possession and the user related to the token must have the
associated (role requirement) roles assigned.

Solution: 
Install the latest version:

* If you use the "Simple OAuth (OAuth2) & OpenID Connect" module for Drupal,
upgrade to Simple OAuth (OAuth2) & OpenID Connect 6.0.7 [3]

Reported By: 
* coffeemakr [4]

Fixed By: 
* Bojan Bogdanovic (bojan_dev) [5]
* coffeemakr [6]
* Juraj Nemec (poker10) [7] of the Drupal Security Team

Coordinated By: 
* Greg Knaddison (greggles) [8] of the Drupal Security Team
* Juraj Nemec (poker10) [9] of the Drupal Security Team

------------------------------------------------------------------------------
Contribution record [10]

[1] https://www.drupal.org/project/simple_oauth
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/simple_oauth/releases/6.0.7
[4] https://www.drupal.org/u/coffeemakr
[5] https://www.drupal.org/u/bojan_dev
[6] https://www.drupal.org/u/coffeemakr
[7] https://www.drupal.org/u/poker10
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10
[10] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal.org/node/3555020

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] Simple OAuth (OAuth2) & OpenID Connect - Critical - Access bypass - SA-CONTRIB-2025-114, security-news, 29.10.2025

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang