zepek_al

Drupal Services 7.x Access Bypass

Nov 5th, 2017
133
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.85 KB | None | 0 0
  1. Drupal Services third party module version 7.x suffers from an access bypass vulnerability.
  2.  
  3.  
  4. View online: https://drupal.org/node/2189509
  5.  
  6. * Advisory ID: DRUPAL-SA-CONTRIB-2014-010
  7. * Project: Services [1] (third-party module)
  8. * Version: 7.x
  9. * Date: 2014-February-05
  10. * Security risk: Highly critical [2]
  11. * Exploitable from: Remote
  12. * Vulnerability: Access bypass
  13.  
  14. -------- DESCRIPTION
  15. ---------------------------------------------------------
  16.  
  17. The Services module enables you to expose an API to third party systems using
  18. REST, XML-RPC or other protocols.
  19.  
  20. .... User update access bypass vulnerability
  21.  
  22. An authenticated user is able to assign additional roles to themselves, which
  23. means they can escalate their privileges by assigning an administrative role.
  24.  
  25. This vulnerability is mitigated by the fact that the user must be able to log
  26. in on the site, the update operation on the user resource configuration must
  27. be enabled, and a site must have an role with more permissions than the
  28. authenticated user.
  29.  
  30. .... Comment access bypass vulnerability
  31.  
  32. As an authenticated user an attacker with the permission to post comments is
  33. able to update other users' comments.
  34.  
  35. This vulnerability is mitigated by the fact that the update operation on the
  36. comment resource configuration must be enabled.
  37.  
  38.  
  39. -------- CVE IDENTIFIER(S) ISSUED
  40. --------------------------------------------
  41.  
  42. * /A CVE identifier [3] will be requested, and added upon issuance, in
  43. accordance with Drupal Security Team processes./
  44.  
  45. -------- VERSIONS AFFECTED
  46. ---------------------------------------------------
  47.  
  48. * Services 7.x-3.x versions prior to 7.x-3.6.
  49.  
  50. Drupal core is not affected. If you do not use the contributed Services [4]
  51. module, there is nothing you need to do.
  52.  
  53. -------- SOLUTION
  54. ------------------------------------------------------------
  55.  
  56. Install the latest version:
  57.  
  58. * If you use the Services module for Drupal 7.x, upgrade to Services
  59. 7.x-3.7
  60. [5]
  61.  
  62. Also see the Services [6] project page.
  63.  
  64. -------- REPORTED BY
  65. ---------------------------------------------------------
  66.  
  67. * The User update access bypass vulnerability was reported by Fredrik
  68. Lassen
  69. [7].
  70. * The Comment access bypass vulnerability was reported by wedge [8].
  71.  
  72. -------- FIXED BY
  73. ------------------------------------------------------------
  74.  
  75. * The User update access bypass vulnerability was fixed by Fredrik Lassen
  76. [9].
  77. * The Comment access bypass vulnerability was fixed by Kyle Browning [10],
  78. the module maintainer.
  79.  
  80. -------- COORDINATED BY
  81. ------------------------------------------------------
  82.  
  83. * Klaus Purer [11] of the Drupal Security Team
  84. * Balazs Dianiska [12] a provisional member of the Drupal Security Team
  85.  
  86. -------- CONTACT AND MORE INFORMATION
  87. ----------------------------------------
  88.  
  89. The Drupal security team can be reached at security at drupal.org or via the
  90. contact form at http://drupal.org/contact [13].
  91.  
  92. Learn more about the Drupal Security team and their policies [14], writing
  93. secure code for Drupal [15], and securing your site [16].
  94.  
  95. Follow the Drupal Security Team on Twitter at
  96. https://twitter.com/drupalsecurity [17]
  97.  
  98.  
  99. [1] http://drupal.org/project/services
  100. [2] http://drupal.org/security-team/risk-levels
  101. [3] http://cve.mitre.org/
  102. [4] http://drupal.org/project/services
  103. [5] https://drupal.org/node/2186581
  104. [6] http://drupal.org/project/services
  105. [7] https://drupal.org/user/243377
  106. [8] https://drupal.org/user/11442
  107. [9] https://drupal.org/user/243377
  108. [10] https://drupal.org/user/211387
  109. [11] http://drupal.org/user/262198
  110. [12] http://drupal.org/user/58645
  111. [13] http://drupal.org/contact
  112. [14] http://drupal.org/security-team
  113. [15] http://drupal.org/writing-secure-code
  114. [16] http://drupal.org/security/secure-configuration
  115. [17] https://twitter.com/drupalsecurity
  116.  
  117. Skype : live:zepek_al
Advertisement
Add Comment
Please, Sign In to add comment