<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>passOnNoUser &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/passonnouser/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Wed, 04 May 2016 12:48:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>passOnNoUser &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bug in passOnNoUser policy allows arbitrary authentication</title>
		<link>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/</link>
					<comments>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 04 May 2016 12:48:42 +0000</pubDate>
				<category><![CDATA[Bug]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[passOnNoUser]]></category>
		<category><![CDATA[Policy]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=923</guid>

					<description><![CDATA[A bug in the passOnNoUser policy allows authentication with an arbitrary password. Affected version: up to privacyIDEA 2.11.2 Propability: Medium Security Severity: High Technical Background The passOnNoUser policy is supposed to check if an authenticating user exists. If the user exists, normal authentication is performed. If the user does not exist in the user store authentication is immediately successful. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A bug in the passOnNoUser policy allows authentication with an arbitrary password.</p>
<ul>
<li>Affected version: up to privacyIDEA 2.11.2</li>
<li>Propability: Medium</li>
<li><strong>Security Severity: High</strong></li>
</ul>
<h2>Technical Background</h2>
<p>The passOnNoUser policy is supposed to check if an authenticating user exists. If the user exists, normal authentication is performed. If the user does not exist in the user store authentication is immediately successful. This is useful in special scenarios, where the Application has several levels of authentication and privacyIDEA is just the second level. Users that do not exist in privacyIDEA will only authenticate with the first level and users, that have an account in privacyIDEA will need to authenticate with the second level.</p>
<p>The Bug: If the policy passOnNoUser is set, it is not checked, if the user exists. <strong>I.e. even users that do exist are successfully authenticated, without checking their OTP value or password.</strong></p>
<h2>Advisory</h2>
<p>You need to disable a policy containing the passOnNoUser action or remove the passOnNoUser action from you policies immediately.</p>
<h2>Fix</h2>
<p>You should update to version 2.11.3 which is released today.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
