Vulnerability Details : CVE-2010-3685
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2010-3685
Probability of exploitation activity in the next 30 days: 0.83%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3685
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
nvd@nist.gov |
CWE ids for CVE-2010-3685
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-3685
-
http://www.debian.org/security/2010/dsa-2113
Debian -- Security Information -- DSA-2113-1 drupal6
-
http://drupal.org/node/880480
SA-CONTRIB-2010-084 - OpenID - Authentication bypass | Drupal.orgPatch;Vendor Advisory
-
http://marc.info/?l=oss-security&m=128440896914512&w=2
'Re: [oss-security] CVE id requests: drupal' - MARC
-
http://www.securityfocus.com/bid/42388
Drupal OpenID Module User Account Authentication Bypass Vulnerability
-
http://drupal.org/node/880476
SA-CORE-2010-002 - Drupal core - Multiple vulnerabilities | Drupal.orgPatch;Vendor Advisory
-
http://marc.info/?l=oss-security&m=128418560705305&w=2
'[oss-security] CVE id requests: drupal' - MARC
Products affected by CVE-2010-3685
- cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:peter_wolanin:openid:5.x-1.1:*:*:*:*:*:*:*
- cpe:2.3:a:peter_wolanin:openid:5.x-1.0:*:*:*:*:*:*:*
- cpe:2.3:a:peter_wolanin:openid:5.x-1.x:dev:*:*:*:*:*:*
- cpe:2.3:a:peter_wolanin:openid:5.x-1.2:*:*:*:*:*:*:*
- cpe:2.3:a:peter_wolanin:openid:5.x-1.3:*:*:*:*:*:*:*