View online: https://www.drupal.org/node/2511518
* Advisory ID: DRUPAL-SA-CONTRIB-2015-129
* Project: Shibboleth authentication [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2015-June-24
* Security risk: 13/25 ( Moderately Critical)
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
Shibboleth authentication module allows users to log in and get permissions
based on federated (SAML2) authentication.
The module didn't filter the text that is displayed as a login link.
This vulnerability was mitigated by the fact that an attacker must have a
role with the permission /Administer blocks/.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Shibboleth authentication 6.x-4.x versions prior to 6.x-4.2.
* Shibboleth authentication 7.x-4.x versions prior to 7.x-4.2.
Drupal core is not affected. If you do not use the contributed Shibboleth
authentication [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
* If you use the Shibboleth authentication module for Drupal 7.x, upgrade
to
Shibboleth authentication 7.x-4.2 [5]
* If you use the Shibboleth authentication module for Drupal 6.x, upgrade
to
Shibboleth authentication 6.x-4.2 [6]
Also see the Shibboleth authentication [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Marcello Cerruti [8]
-------- FIXED BY
------------------------------------------------------------
* Kristof Bajnok [9] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Michael Hess [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] https://www.drupal.org/project/shib_auth
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/shib_auth
[5] https://www.drupal.org/node/2511278
[6] https://www.drupal.org/node/2511280
[7] https://www.drupal.org/project/shib_auth
[8] https://www.drupal.org/user/192687
[9] https://www.drupal.org/user/250470
[10] https://www.drupal.org/u/mlhess
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2511424
* Advisory ID: DRUPAL-SA-CONTRIB-2015-128
* Project: me aliases [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2015-June-24
* Security risk: 11/25 ( Moderately Critical)
AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:All [2]
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
'me aliases' module provides shortcut paths to current user's pages, eg
user/me, blog/me, user/me/edit, tracker/me etc.
The view user argument handler for the 'me' module has an access bypass
vulnerability where it does not check the supplied argument against the
current user. This allows any user to access the content served by the view
by substituting 'me' in the URL with a user id even when they don't have
permission to access the content.
These only affects Views which use the Views 'me' user argument handler.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* me aliases 7.x-1.x versions prior to 7.x-1.2
* me aliases 6.x-2.x versions prior to 6.x-2.10
Drupal core is not affected. If you do not use the contributed me aliases [4]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the 'me aliases' module for Drupal 7.x, upgrade to me 7.x-1.2
[5]
* If you use the 'me aliases' module for Drupal 6.x, upgrade to me 6.x-2.10
[6]
Also see the me aliases [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* akosipax [8]
-------- FIXED BY
------------------------------------------------------------
* nohup [9] the module maintainer
* Stella Power [10] of the Drupal Security Team
-------- COORDINATED BY
------------------------------------------------------
* Stella Power [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] https://www.drupal.org/project/me
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/me
[5] https://www.drupal.org/node/2511386
[6] https://www.drupal.org/node/2511378
[7] https://www.drupal.org/project/me
[8] https://www.drupal.org/user/1297728
[9] https://www.drupal.org/user/269763
[10] https://www.drupal.org/user/66894
[11] https://www.drupal.org/user/66894
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2511410
* Advisory ID: DRUPAL-SA-CONTRIB-2015-127
* Project: HybridAuth Social Login [1] (third-party module)
* Version: 7.x
* Date: 2015-June-24
* Security risk: 8/25 ( Less Critical)
AC:Basic/A:None/CI:None/II:None/E:Theoretical/TD:Uncommon [2]
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
The HybridAuth Social Login module enables you to allow visitors to
authenticate or login to a Drupal site using their identities from social
networks like Facebook or Twitter.
The module allows account creation through social login when the
configuration is set to allow user registration by administrators only.
This vulnerability is mitigated by the fact that a site must be configured to
allow user registration by administrators only and that authenticated user
accounts can access sensitive data that would otherwise not be shown to
anonymous users.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* HybridAuth Social Login 7.x-2.x versions prior to 7.x-2.13.
Drupal core is not affected. If you do not use the contributed HybridAuth
Social Login [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the HybridAuth Social Login module for Drupal 7.x, upgrade to
HybridAuth Social Login 7.x-2.13 [5]
Also see the HybridAuth Social Login [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Tomas Fulopp [7]
-------- FIXED BY
------------------------------------------------------------
* Andrew Berezovsky [8] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Klaus Purer [9] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [14]
[1] https://www.drupal.org/project/hybridauth
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/hybridauth
[5] https://www.drupal.org/node/2511200
[6] https://www.drupal.org/project/hybridauth
[7] https://www.drupal.org/u/vacilando
[8] https://www.drupal.org/u/duozersk
[9] https://www.drupal.org/u/klausi
[10] https://www.drupal.org/contact
[11] https://www.drupal.org/security-team
[12] https://www.drupal.org/writing-secure-code
[13] https://www.drupal.org/security/secure-configuration
[14] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2480241
* Advisory ID: DRUPAL-SA-CONTRIB-2015-100
* Project: Camtasia Relay [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2015-April-29
* Security risk: 10/25 ( Moderately Critical)
AC:Basic/A:User/CI:None/II:None/E:Exploit/TD:Default [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
This module enables you to integrate your Drupal site with TechSmith Relay
software.
The module doesn't sufficiently sanitize user input under the meta access
tab.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "view meta information".
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* camtasia_relay 6.x-2.x versions prior to 6.x-3.2.
* camtasia_relay 7.x-2.x versions prior to 7.x-1.3.
Drupal core is not affected. If you do not use the contributed Camtasia Relay
[4] module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the camtasia_relay module for Drupal 6.x, upgrade to
camtasia_relay 6.x-3.2 [5]
* If you use the camtasia_relay module for Drupal 7.x, upgrade to
camtasia_relay 7.x-1.3 [6]
Also see the Camtasia Relay [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Owen Barton [8] of the Drupal Security Team
* Pere Orga [9]
-------- FIXED BY
------------------------------------------------------------
* Nikhil Dubbaka [10] the module maintainer
* Aaron Ott [11] of the Drupal Security Team
-------- COORDINATED BY
------------------------------------------------------
* Aaron Ott [12] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [13].
Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and securing your site [16].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [17]
[1] https://www.drupal.org/project/camtasia_relay
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/camtasia_relay
[5] https://www.drupal.org/node/2480169
[6] https://www.drupal.org/node/2480171
[7] https://www.drupal.org/project/camtasia_relay
[8] https://www.drupal.org/user/19668
[9] https://www.drupal.org/user/2301194
[10] https://www.drupal.org/user/372123
[11] https://www.drupal.org/user/154069
[12] https://www.drupal.org/user/154069
[13] https://www.drupal.org/contact
[14] https://www.drupal.org/security-team
[15] https://www.drupal.org/writing-secure-code
[16] https://www.drupal.org/security/secure-configuration
[17] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2507753
* Advisory ID: DRUPAL-SA-CONTRIB-2015-126
* Project: Content Construction Kit (CCK) [1] (third-party module)
* Version: 6.x
* Date: 2015-June-17
* Security risk: 9/25 ( Less Critical)
AC:Basic/A:None/CI:None/II:None/E:Theoretical/TD:Default [2]
* Vulnerability: Open Redirect
-------- DESCRIPTION
---------------------------------------------------------
The Content Construction Kit (CCK) project is a set of modules that allows
you to add custom fields to nodes using a web browser.
CCK uses a "destinations" query string parameter in URLs to redirect users to
new destinations after completing an action on a few administration pages.
Under certain circumstances, malicious users can use this parameter to
construct a URL that will trick users into being redirected to a 3rd party
website, thereby exposing the users to potential social engineering attacks.
See also: SA-CORE-2015-002 [3]
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [4] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Content Construction Kit (CCK) 6.x-2.x versions prior to 6.x-2.10.
Drupal core is not affected. If you do not use the contributed Content
Construction Kit (CCK) [5] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Content Construction Kit (CCK) module for Drupal 6.x,
upgrade to Content Construction Kit (CCK) 6.x-2.10 [6]
Also see the Content Construction Kit (CCK) [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Michael Smith [8]
* David Rothstein [9] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Pere Orga [10] of the Drupal Security Team
* Neil Drumm [11], module maintainer and member of the Drupal Security
Team
-------- COORDINATED BY
------------------------------------------------------
* The Drupal Security Team [12]
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [13].
Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and securing your site [16].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [17]
[1] https://www.drupal.org/project/cck
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/SA-CORE-2015-002
[4] http://cve.mitre.org/
[5] https://www.drupal.org/project/cck
[6] https://www.drupal.org/node/2507763
[7] https://www.drupal.org/project/cck
[8] https://www.drupal.org/user/1291584
[9] https://www.drupal.org/u/david_rothstein
[10] https://www.drupal.org/user/2301194
[11] https://www.drupal.org/user/3064
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/contact
[14] https://www.drupal.org/security-team
[15] https://www.drupal.org/writing-secure-code
[16] https://www.drupal.org/security/secure-configuration
[17] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/SA-CORE-2015-002
* Advisory ID: DRUPAL-SA-CORE-2015-002
* Project: Drupal core [1]
* Version: 6.x, 7.x
* Date: 2015-June-17
* Security risk: 15/25 ( Critical)
AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
* Vulnerability: Access bypass, Information Disclosure, Open Redirect,
Multiple vulnerabilities
-------- DESCRIPTION
---------------------------------------------------------
.... Impersonation (OpenID module - Drupal 6 and 7 - Critical)
A vulnerability was found in the OpenID module that allows a malicious user
to log in as other users on the site, including administrators, and hijack
their accounts.
This vulnerability is mitigated by the fact that the victim must have an
account with an associated OpenID identity from a particular set of OpenID
providers (including, but not limited to, Verisign, LiveJournal, or
StackExchange).
.... Open redirect (Field UI module - Drupal 7 - Less critical)
The Field UI module uses a "destinations" query string parameter in URLs to
redirect users to new destinations after completing an action on a few
administration pages. Under certain circumstances, malicious users can use
this parameter to construct a URL that will trick users into being redirected
to a 3rd party website, thereby exposing the users to potential social
engineering attacks.
This vulnerability is mitigated by the fact that only sites with the Field UI
module enabled are affected.
Drupal 6 core is not affected, but see the similar advisory for the Drupal 6
contributed CCK module: SA-CONTRIB-2015-126 [3]
.... Open redirect (Overlay module - Drupal 7 - Less critical)
The Overlay module displays administrative pages as a layer over the current
page (using JavaScript), rather than replacing the page in the browser
window. The Overlay module does not sufficiently validate URLs prior to
displaying their contents, leading to an open redirect vulnerability.
This vulnerability is mitigated by the fact that it can only be used against
site users who have the "Access the administrative overlay" permission, and
that the Overlay module must be enabled.
.... Information disclosure (Render cache system - Drupal 7 - Less critical)
On sites utilizing Drupal 7's render cache system to cache content on the
site by user role, private content viewed by user 1 may be included in the
cache and exposed to non-privileged users.
This vulnerability is mitigated by the fact that render caching is not used
in Drupal 7 core itself (it requires custom code or the contributed Render
Cache [4] module to enable) and that it only affects sites that have user 1
browsing the live site. Exposure is also limited if an administrative role
has been assigned to the user 1 account (which is done, for example, by the
Standard install profile that ships with Drupal core).
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* Impersonation (OpenID module - Drupal 6 and 7): *CVE-2015-3234*
* Open redirect (Field UI module - Drupal 7): *CVE-2015-3232*
* Open redirect (Overlay module - Drupal 7: *CVE-2015-3233*
* Information disclosure (Render cache system - Drupal 7): *CVE-2015-3231*
-------- VERSIONS AFFECTED
---------------------------------------------------
* Drupal core 6.x versions prior to 6.36
* Drupal core 7.x versions prior to 7.38
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Drupal 6.x, upgrade to Drupal core 6.36 [5]
* If you use Drupal 7.x, upgrade to Drupal core 7.38 [6]
Also see the Drupal core [7] project page.
-------- REPORTED BY
---------------------------------------------------------
Impersonation in the OpenID module:
* Vladislav Mladenov
* Christian Mainka [8]
* Christian Koßmann [9]
Open redirect in the Field UI module:
* Michael Smith [10]
Open redirect in the Overlay module:
* Jeroen Vreuls [11]
* David Rothstein [12] of the Drupal Security Team
Information disclosure in the render cache system:
* Nathaniel Catchpole [13] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
Impersonation in the OpenID module:
* Christian Schmidt [14], OpenID module maintainer
* Christian Mainka [15]
* Christian Koßmann [16]
Open redirect in the Field UI module:
* Yves Chedemois [17], Field UI module maintainer
* Damien McKenna [18] provisional member of the Drupal Security Team
* Pere Orga [19] of the Drupal Security Team
* David Rothstein [20] of the Drupal Security Team
* Klaus Purer [21] of the Drupal Security Team
Open redirect in the Overlay module:
* Jeroen Vreuls [22]
* Ben Dougherty [23] of the Drupal Security Team
* David Rothstein [24] of the Drupal Security Team
* Katherine Senzee [25], Overlay module maintainer
Information disclosure in the render cache system:
* David Rothstein [26] of the Drupal Security Team
* Wim Leers [27]
* willzyx [28]
-------- COORDINATED BY
------------------------------------------------------
* The Drupal Security Team [29]
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [30].
Learn more about the Drupal Security team and their policies [31], writing
secure code for Drupal [32], and securing your site [33].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [34]
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/node/2507753
[4] https://www.drupal.org/project/render_cache
[5] https://www.drupal.org/drupal-6.36-release-notes
[6] https://www.drupal.org/drupal-7.38-release-notes
[7] https://www.drupal.org/project/drupal
[8] https://www.drupal.org/user/1096424
[9] https://www.drupal.org/user/3101253
[10] https://www.drupal.org/user/1291584
[11] https://www.drupal.org/user/2700643
[12] https://www.drupal.org/u/david_rothstein
[13] https://www.drupal.org/u/catch
[14] https://www.drupal.org/user/216078
[15] https://www.drupal.org/user/1096424
[16] https://www.drupal.org/user/3101253
[17] https://www.drupal.org/user/39567
[18] https://www.drupal.org/user/108450
[19] https://www.drupal.org/user/2301194
[20] https://www.drupal.org/u/david_rothstein
[21] https://www.drupal.org/u/klausi
[22] https://www.drupal.org/user/2700643
[23] https://www.drupal.org/user/1852732
[24] https://www.drupal.org/u/david_rothstein
[25] https://www.drupal.org/u/ksenzee
[26] https://www.drupal.org/u/david_rothstein
[27] https://www.drupal.org/user/99777
[28] https://www.drupal.org/user/1043862
[29] https://www.drupal.org/security-team
[30] https://www.drupal.org/contact
[31] https://www.drupal.org/security-team
[32] https://www.drupal.org/writing-secure-code
[33] https://www.drupal.org/security/secure-configuration
[34] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2507741
* Advisory ID: DRUPAL-SA-CONTRIB-2015-125
* Project: Acquia Cloud Site Factory Connector [1] (third-party module)
* Version: 7.x
* Date: 2015-June-17
* Security risk: 9/25 ( Less Critical)
AC:Basic/A:None/CI:None/II:None/E:Theoretical/TD:Default [2]
* Vulnerability: Open Redirect
-------- DESCRIPTION
---------------------------------------------------------
Acquia Cloud Site Factory provides an environment and a robust set of tools
that simplify management of many Drupal sites, allowing you to quickly
deliver and manage any number of websites.
The module ships with a modified version of the core Overlay JavaScript file,
which is vulnerable to an open redirect attack (see SA-CORE-2015-002 [3]).
Only sites with the Overlay module enabled are vulnerable.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [4] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Acquia Cloud Site Factory 7.x-1.x versions prior to 7.x-1.14
Drupal core is not affected. If you do not use the contributed Acquia Cloud
Site Factory Connector [5] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Acquia Cloud Site Factory module for Drupal 7.x, upgrade
to
Acquia Cloud Site Factory 7.x-1.14 [6]
Also see the Acquia Cloud Site Factory Connector [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Jeroen Vreuls [8]
* David Rothstein [9] of the Drupal Security Team
* Pere Orga [10] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Stéphane Corlosquet [11], module maintainer and member of the Drupal
Security Team
-------- COORDINATED BY
------------------------------------------------------
* The Drupal Security Team [12]
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [13].
Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and securing your site [16].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [17]
[1] https://www.drupal.org/project/acsf
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/SA-CORE-2015-002
[4] http://cve.mitre.org/
[5] https://www.drupal.org/project/acsf
[6] https://www.drupal.org/node/2507535
[7] https://www.drupal.org/project/acsf
[8] https://www.drupal.org/user/2700643
[9] https://www.drupal.org/u/david_rothstein
[10] https://www.drupal.org/u/pere-orga
[11] https://www.drupal.org/u/scor
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/contact
[14] https://www.drupal.org/security-team
[15] https://www.drupal.org/writing-secure-code
[16] https://www.drupal.org/security/secure-configuration
[17] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2507645
* Advisory ID: DRUPAL-SA-CONTRIB-2015-122
* Project: Administration Views [1] (third-party module)
* Version: 7.x
* Date: 2015-June-17
* Security risk: 12/25 ( Moderately Critical)
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:Default [2]
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
This module replaces administrative overview/listing pages with Views for
improved usability.
When combined with other contributed or custom modules, the Administration
Views module improperly grants users access to administration pages including
the permissions page.
This vulnerability is mitigated by the fact that it does not appear in the
module itself, but only when combined with select other custom or contributed
modules.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Administration Views 7.x-1.x versions prior to 7.x-1.4.
Drupal core is not affected. If you do not use the contributed Administration
Views [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Administration Views module for Drupal 7.x, upgrade to
Administration Views 7.x-1.4 [5]
Also see the Administration Views [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Barry Fisher [7]
-------- FIXED BY
------------------------------------------------------------
* Robert [8]
-------- COORDINATED BY
------------------------------------------------------
* Pere Orga [9] of the Drupal Security Team
* Greg Knaddison [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] https://www.drupal.org/project/admin_views
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/admin_views
[5] https://www.drupal.org/node/2430043
[6] https://www.drupal.org/project/admin_views
[7] https://www.drupal.org/user/202648
[8] https://www.drupal.org/u/rob230
[9] https://www.drupal.org/user/2301194
[10] https://www.drupal.org/user/36762
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity