-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1877
          Password Reset Landing Page (PRLP) - Highly critical -
                    Access bypass - SA-CONTRIB-2020-021
                                28 May 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Drupal Password Reset Landing Page (PRLP)
Publisher:         Drupal
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://www.drupal.org/sa-contrib-2020-021

- --------------------------BEGIN INCLUDED TEXT--------------------

Password Reset Landing Page (PRLP) - Highly critical - Access bypass -
SA-CONTRIB-2020-021

Project: 
Password Reset Landing Page (PRLP)
Date: 
2020-May-27
Security risk: 
Highly critical 20?25 AC:Basic/A:None/CI:All/II:All/E:Theoretical/TD:All
Vulnerability: 
Access bypass
Description: 

This module enables you to force a password update when using password reset
link.
The module doesn't sufficiently validate the login URL allowing a malicious
user to use a specially crafted URL to log in as another user.

Solution: 

Install the latest version:

  * If you use the PRLP module for Drupal 8.x, upgrade to PRLP 8.x-1.5

Also see the Password Reset Landing Page (PRLP) project page.

Reported By: 

  * Kyle Einecker
  * Seth Hill

Fixed By: 

  * Joseph Purcell
  * Jitesh Doshi
  * Christian Crawford
  * Kyle Einecker

Coordinated By: 

  * Greg Knaddison of the Drupal Security Team

Contact and more information

The Drupal security team can be reached by email at security at drupal.org or
via the contact form.

Learn more about the Drupal Security team and their policies, writing secure
code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter @drupalsecurity

Contributing organizations for this advisory

  * Bounteous
  * SpinSpire
  * Avionos
  * Colorado Governor's Office of Information Technology - Colorado Digital
    Service


The security team is made up of volunteers around the world. The companies
above have sponsored time on this release.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXs8Qv+NLKJtyKPYoAQhSFA/+MvW+UqcV2WnueCvyp+THzbFX9Vrgxdpk
4FZ+X4QiqDp/pOBqudf42sy0G15T+BIBrG8oKhipsl1kLhxdJkeDZkXiw5sR8sbo
Z0oeu3rFZ8zO03WVHRErUMNcu3Ho/9iJ3/oef0S8Bf9tDrB/xCzyU1d93v4xVzuB
1RSCXzG3Kwc4zGhXyo9ycoPFtfedJRis/AWqfwf+hff7J34325cAaHBGwOp3aPFm
tOUntF5ky5k06ZCe0huKlu5Jyihrj5SjP6n/NxfS2/7phQkcrP1tGnALoLAdnjEw
uNX2NL8rT+VoXjpTmwnF6FhDd5XQyv5NF9/M/3vNrvl+PpkxVbm2+EItDFkCFQq1
66Zm4HT+JqRB69LQr2rukaeGtrQ4biUxe/NAoIeWRwlX49dxcErW8eYkxBAvBHiH
fZ2KwUo6K6zSLnhcE+DOiUFUGChBXExA/KjCNGRGohGeM+3JoH1pe8jWsKMCqGlr
5+8YHiqPNZ5A+0WkQi+IV4H9COnOjB95IEVCRMSuchR4ICbN+NVplVKXlH2n0ahG
7oVr8YYtawPwCvCLOWkXCf10RpJaoFAaKlvFyGGnLRYtcW9xT7bPWPuJ2AhInsdr
nrTigfbq1B315APXmQyODhZdVbIdhGCzkwZCcoIwVf01qd3L8/e/9hxaJgEiSQ9z
ZlKLDr9Lbrc=
=VlpZ
-----END PGP SIGNATURE-----