Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
general:secadv-2019-01 [2019/10/10 16:52]
Erich Meier
general:secadv-2019-01 [2019/10/10 16:54] (current)
Erich Meier
Line 28: Line 28:
  
 During internal testing, we discovered a security vulnerability in the Stages login procedure that can result in users being able to impersonate another Stages user. Any Stages system accounts, e.g. “root” and “default” are not affected. Direct access to server resources cannot be gained. The vulnerability can only be exploited when SAML authentication is enabled on the server. If SAML authentication is not enabled, the system is not vulnerable. During internal testing, we discovered a security vulnerability in the Stages login procedure that can result in users being able to impersonate another Stages user. Any Stages system accounts, e.g. “root” and “default” are not affected. Direct access to server resources cannot be gained. The vulnerability can only be exploited when SAML authentication is enabled on the server. If SAML authentication is not enabled, the system is not vulnerable.
- 
-All vulnerable Stages Cloud instances have already been upgraded to versions that do not have the issue. 
  
 As the vulnerability is only known within Method Park, active exploitation is very improbable. None of the systems analyzed by Method Park including all Stages Cloud instances showed any evidence of unauthorized usage. Please contact us for further information how to analyze if your system has been impacted. As the vulnerability is only known within Method Park, active exploitation is very improbable. None of the systems analyzed by Method Park including all Stages Cloud instances showed any evidence of unauthorized usage. Please contact us for further information how to analyze if your system has been impacted.
Line 37: Line 35:
 ===== Fix ===== ===== Fix =====
  
-Upgrade ​your system to one of the following Stages versions:+All vulnerable Stages Cloud instances have already been upgraded to versions that do not have the issue. 
 + 
 +If you are using Stages on premise, please upgrade ​your system to one of the following Stages versions:
  
   * 7.3.5.1   * 7.3.5.1