<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Bug &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/category/bug/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Tue, 13 Feb 2018 07:12:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Bug &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bug in WebUI can lead to disclosure of credentials</title>
		<link>https://www.privacyidea.org/bug-webui-can-lead-disclosure-credentials/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 13 Feb 2018 07:12:23 +0000</pubDate>
				<category><![CDATA[Bug]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Whatsup]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1331</guid>

					<description><![CDATA[A bug in the WebUI can lead to disclosure of the credentials of previously logged in users. Under certain conditions a local, physical attacker can get access to passwords of previously logged in users from the WebUI. Details Preconditions This problem occurs, if the following conditions apply: A logged in user in the WebUI locks [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A bug in the WebUI can lead to disclosure of the credentials of previously logged in users.</p>
<p>Under certain conditions a local, physical attacker can get access to passwords of previously logged in users from the WebUI.</p>
<h2>Details</h2>
<h3>Preconditions</h3>
<p>This problem occurs, if the following conditions apply:</p>
<ol>
<li>A logged in user in the WebUI locks the WebUI or logs out and does not close the browser tab.</li>
<li>The attacker gets local access to the browser tab.</li>
</ol>
<h3>Affected versions</h3>
<p>privacyIDEA &lt; 2.21.4</p>
<h3>Technical background</h3>
<div>The Web UI writes many debug information to the console log in the browser. Also the login credentials are logged to the console and do not get deleted when the user logs out or locks the WebUI.</div>
<div>
<div>An attacker can now go to the user&#8217;s desktop and to the browser tab and open the console log. In the console log the attacker can find the sensitive information!</div>
</div>
<h3>Advisory</h3>
<div>Access to the browser tab by any third person needs to be avoided:</div>
<ul>
<li>No third person should use the user&#8217;s computer/desktop</li>
<li>The desktop should be locked, when the user leaves his desktop</li>
<li>The browser tab should be closed, when the user has finished working in the UI.</li>
</ul>
<h3>Fix</h3>
<p>This bug is fixed in the current version 2.21.4 of privacyIDEA.</p>
<div>We recommend to follow the advices for mitigation and upgrade to the current version of privacyIDEA in a timely manner.</div>
<h3>Credits</h3>
<div>This bug was discoverd in an external review by René Arends from the Hogeschool Rotterdam.</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bug in passOnNoUser policy allows arbitrary authentication</title>
		<link>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/</link>
					<comments>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 04 May 2016 12:48:42 +0000</pubDate>
				<category><![CDATA[Bug]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[passOnNoUser]]></category>
		<category><![CDATA[Policy]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=923</guid>

					<description><![CDATA[A bug in the passOnNoUser policy allows authentication with an arbitrary password. Affected version: up to privacyIDEA 2.11.2 Propability: Medium Security Severity: High Technical Background The passOnNoUser policy is supposed to check if an authenticating user exists. If the user exists, normal authentication is performed. If the user does not exist in the user store authentication is immediately successful. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A bug in the passOnNoUser policy allows authentication with an arbitrary password.</p>
<ul>
<li>Affected version: up to privacyIDEA 2.11.2</li>
<li>Propability: Medium</li>
<li><strong>Security Severity: High</strong></li>
</ul>
<h2>Technical Background</h2>
<p>The passOnNoUser policy is supposed to check if an authenticating user exists. If the user exists, normal authentication is performed. If the user does not exist in the user store authentication is immediately successful. This is useful in special scenarios, where the Application has several levels of authentication and privacyIDEA is just the second level. Users that do not exist in privacyIDEA will only authenticate with the first level and users, that have an account in privacyIDEA will need to authenticate with the second level.</p>
<p>The Bug: If the policy passOnNoUser is set, it is not checked, if the user exists. <strong>I.e. even users that do exist are successfully authenticated, without checking their OTP value or password.</strong></p>
<h2>Advisory</h2>
<p>You need to disable a policy containing the passOnNoUser action or remove the passOnNoUser action from you policies immediately.</p>
<h2>Fix</h2>
<p>You should update to version 2.11.3 which is released today.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>A bug in policy module prevents authenticating with serial number in 2.6</title>
		<link>https://www.privacyidea.org/a-bug-in-policy-module-prevents-authenticating-with-serial-number-in-2-6/</link>
					<comments>https://www.privacyidea.org/a-bug-in-policy-module-prevents-authenticating-with-serial-number-in-2-6/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 23 Sep 2015 08:07:01 +0000</pubDate>
				<category><![CDATA[Bug]]></category>
		<category><![CDATA[Whatsup]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=743</guid>

					<description><![CDATA[A bug in the policy module prevents authenticating with a serial number. Affected version: privacyIDEA 2.6 Propability: High Security Severity: Low Technical Background privacyIDEA allows to authenticate with a username or a token serial number. I.e. the API can do a POST /validate/check user=username pass=PIN+OTP or a POST /validate/check serial=serialnumber pass=PIN+OTP A bug in file [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A bug in the policy module prevents authenticating with a serial number.</p>
<ul>
<li>Affected version: privacyIDEA 2.6</li>
<li>Propability: High</li>
<li>Security Severity: Low</li>
</ul>
<h2>Technical Background</h2>
<p>privacyIDEA allows to authenticate with a username or a token serial number. I.e. the API can do a</p>
<pre>POST /validate/check</pre>
<pre>user=username
pass=PIN+OTP</pre>
<p>or a</p>
<pre>POST /validate/check</pre>
<pre>serial=serialnumber
pass=PIN+OTP</pre>
<p>A bug in file privacyidea/lib/policydecorators.py, which checks for challenge-response functionality will cause an authentication request without a username to fail.</p>
<h2>Advisory</h2>
<p>In common scenarios the user will always authenticate with his username.<br />
Only if you are using Remote token types or if you have a special workflow there might be scenarios when authentication is done using only the serial number of the token.</p>
<p>If you are not authenticating with serial numbers, you do not need to take any actions.</p>
<p>If you are running such a scenario either</p>
<ul>
<li>use privacyIDEA 2.5</li>
<li>use privacyIDEA &gt;= 2.7dev1</li>
<li>or drop us a note.</li>
</ul>
<h2>Fix</h2>
<p>The bug is fixed in 2.7 development release and will be released with 2.7 in October.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/a-bug-in-policy-module-prevents-authenticating-with-serial-number-in-2-6/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bug in LDAP Resolver up to privacyIDEA 2.5</title>
		<link>https://www.privacyidea.org/bug-in-ldap-resolver-up-to-privacyidea-2-5/</link>
					<comments>https://www.privacyidea.org/bug-in-ldap-resolver-up-to-privacyidea-2-5/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 07 Sep 2015 12:24:30 +0000</pubDate>
				<category><![CDATA[Bug]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Whatsup]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=731</guid>

					<description><![CDATA[A bug in the LDAP Resolver can lead to unauthorized access as an LDAP user. Under certain conditions a rogue user can login as an LDAP user to the privacyIDEA web UI or guess a static password part during authentication when the policy scope=authentication, otppin=userstore is used. Details Preconditions This problem only occurs, when both conditions [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A bug in the LDAP Resolver can lead to unauthorized access as an LDAP user.</p>
<p>Under certain conditions a rogue user can login as an LDAP user to the privacyIDEA web UI or guess a static password part during authentication when the policy <em>scope=authentication</em>, <em>otppin=userstore</em> is used.</p>
<h2>Details</h2>
<h3>Preconditions</h3>
<p>This problem only occurs, when both conditions are met:</p>
<ol>
<li>The LDAP resolver defines a wrong, not existing UID-Type.</li>
<li>The LDAP server is configured to allow anonymous binds.</li>
</ol>
<h3>Technical background</h3>
<p>During the password verification process, the LDAP resolver tries to find the user with the given UID &#8211; defined by the UID type. It then uses the user objects DN to bind to the LDAP server.</p>
<p>If the UID type does not exist, the LDAP resolver will get an empty DN to bind to the LDAP server. Binding with an empty DN is equal to an anonymous bind. If your LDAP server accepts anonymous binds, the bind will be successfull and the password verification is regarded as successful.</p>
<h3>Advisory</h3>
<p>If you have an LDAP server, that allows anonymous binds, you should check your LDAP resolver. Please check, that the UID Type you specified, really exist.</p>
<p>Verify authenticating to the Web UI with an existing LDAP user, but with an invalid password.</p>
<h3>Fix</h3>
<p>This bug is fixed in <a href="https://github.com/privacyidea/privacyidea/commit/1c6219e3b5d7ba6c8d4d3895ea44e4912d4b3bdd" target="_blank">this commit</a> and will be release with version 2.6 shortly.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/bug-in-ldap-resolver-up-to-privacyidea-2-5/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
