Table of Contents

Security Advisory 2019-01

Summary

Possible user impersonation in Stages when SAML authentication is enabled

Release Date

2019-10-11

Severity

Medium (according to NVD definition; CVSS score: 4.6)

Affected Versions

Previous minor and major versions, e.g. 7.1.x.y, 7.0.x.y, 6.6.x.y, 6.5.x.y, or 5.x.y.z are not affected.

Only installations that have enabled SAML authentication are vulnerable.

To find out which Stages version you are running, log in as “root” and click on the “Info” icon (6.x) or “Administration” menu (7.x).

Description

During internal testing, we discovered a security vulnerability in the Stages login procedure that can result in users being able to impersonate another Stages user. Any Stages system accounts, e.g. “root” and “default” are not affected. Direct access to server resources cannot be gained. The vulnerability can only be exploited when SAML authentication is enabled on the server. If SAML authentication is not enabled, the system is not vulnerable.

As the vulnerability is only known within Method Park, active exploitation is very improbable. None of the systems analyzed by Method Park including all Stages Cloud instances showed any evidence of unauthorized usage. Please contact us for further information how to analyze if your system has been impacted.

If you see indications of unauthorized usage, please contact security-alerts@methodpark.com immediately.

Resolution

All vulnerable Stages Cloud instances have already been upgraded to versions that do not have the issue.

If you are using Stages on premise, please upgrade your system to one of the following Stages versions:

Please contact the Stages customer care team via stages-support@methodpark.com in case you need further support or if you are not able to upgrade your system at this time.