Project: OpenID Connect Microsoft Azure Active Directory clientDate: 2021-November-17Security risk: Moderately critical 14∕25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Access BypassDescription: This module enables users to authenticate through their Microsoft Azure AD account.
The module does not sufficiently check authorization before updating user profile information in certain non-default configurations. This could lead a user being able to hijack another existing account.
This vulnerability is mitigated by the fact that an attacker must have knowledge of user accounts that have the administrator role or accounts with the ‘Set a password for local authentication’ permission. In addition the site must be configured with the ‘Update email address in user profile’ setting turned on.Solution: Install the latest version:

If you use the OpenID Connect Microsoft Azure Active Directory client module 7.x-1.x, upgrade to OpenID Connect Microsoft Azure Active Directory client 7.x-1.2
If you use the OpenID Connect Microsoft Azure Active Directory client module 8.x-1.x, upgrade to OpenID Connect Microsoft Azure Active Directory client 8.x-1.4
Reported By: 
John Kingsnorth
Fixed By: 
John Kingsnorth
Lee

Link to original post https://www.drupal.org/sa-contrib-2021-044 from Teknoids News

Read the original story