Security Advisory 2019-01
Possible user impersonation in Stages when SAML authentication is enabled
- 220.127.116.11 to 18.104.22.168
- 22.214.171.124 to 126.96.36.199
- 188.8.131.52 to 184.108.40.206
Previous minor and major versions, e.g. 7.1.x.y, 7.0.x.y, 6.6.x.y, 6.5.x.y, or 5.x.y.z are not affected.
Only installations that have enabled SAML authentication are vulnerable.
To find out which Stages version you are running, log in as “root” and click on the “Info” icon (6.x) or “Administration” menu (7.x).
During internal testing, we discovered a security vulnerability in the Stages login procedure that can result in users being able to impersonate another Stages user. Any Stages system accounts, e.g. “root” and “default” are not affected. Direct access to server resources cannot be gained. The vulnerability can only be exploited when SAML authentication is enabled on the server. If SAML authentication is not enabled, the system is not vulnerable.
As the vulnerability is only known within Method Park, active exploitation is very improbable. None of the systems analyzed by Method Park including all Stages Cloud instances showed any evidence of unauthorized usage. Please contact us for further information how to analyze if your system has been impacted.
If you see indications of unauthorized usage, please contact firstname.lastname@example.org immediately.
All vulnerable Stages Cloud instances have already been upgraded to versions that do not have the issue.
If you are using Stages on premise, please upgrade your system to one of the following Stages versions:
Please contact the Stages customer care team via email@example.com in case you need further support or if you are not able to upgrade your system at this time.