View online: https://www.drupal.org/sa-contrib-2019-026
Project: Services [1] Version: 7.x-3.x-dev Date: 2019-February-27 Security risk: *Critical* 19∕25 AC:None/A:None/CI:All/II:Some/E:Theoretical/TD:Default [2] Vulnerability: SQL Injection
Description: This module provides a standardized solution for building API's so that external clients can communicate with Drupal.
The module doesn't sufficiently sanitize user input for entity index resources thus allowing SQL Injection attacks.
This vulnerability is mitigated by the fact that the Drupal 7 site must have an "index" resource(s) enabled under the Services endpoint configuration (admin/structure/services/list/MY-ENDPOINT/resources) and an attacker must know the endpoint's machine name.
Install the 7.x-3.22 [3] version of the Services module for the fix, or simply disable any "index" resources to stop the attack vector.
Solution: Install the latest version:
* If you use the 7.x-3.x Services module for Drupal, upgrade to Services 7.x-3.22 [4]
Reported By: * Samuel Mortenson [5] of the Drupal Security Team
Fixed By: * Tyler Frankenstein [6] * Samuel Mortenson [7] of the Drupal Security Team * Ivo Van Geertruyen [8] of the Drupal Security Team
Coordinated By: * Samuel Mortenson [9] of the Drupal Security Team
[1] https://www.drupal.org/project/services [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/services/releases/7.x-3.22 [4] https://www.drupal.org/project/services/releases/7.x-3.22 [5] https://www.drupal.org/user/2582268 [6] https://www.drupal.org/user/150680 [7] https://www.drupal.org/user/2582268 [8] https://www.drupal.org/user/383424 [9] https://www.drupal.org/user/2582268