Harden user_pass_rehash() against attack

Created on 25 April 2022, over 2 years ago
Updated 5 February 2024, 11 months ago

Problem/Motivation

Route user.cancel_confirm contains {hashed_pass}.
For users without a password (e.g. external authenticated like OpenID Connect) this measurement doesn't add any safety other than the "last login time" property of an account.
See UserController::confirmCancel and user_pass_rehash implementations for details.

Proposed resolution

Find some other measurement to prevent misuse of this route.

πŸ› Bug report
Status

Fixed

Version

10.2 ✨

Component
User moduleΒ  β†’

Last updated about 12 hours ago

Created by

πŸ‡¦πŸ‡ΉAustria guedressel

Live updates comments and jobs are added and updated live.
  • Security improvements

    It makes Drupal less vulnerable to abuse or misuse. Note, this is the preferred tag, though the Security tag has a large body of issues tagged to it. Do NOT publicly disclose security vulnerabilities; contact the security team instead. Anyone (whether security team or not) can apply this tag to security improvements that do not directly present a vulnerability e.g. hardening an API to add filtering to reduce a common mistake in contributed modules.

Sign in to follow issues

Merge Requests

Comments & Activities

Not all content is available!

It's likely this issue predates Contrib.social: some issue and comment data are missing.

Production build 0.71.5 2024