View online: https://www.drupal.org/node/2902606
* Advisory ID: DRUPAL-SA-CONTRIB-2017-069 * Project: Views Refresh [1] (third-party module) * Version: 7.x, 8.x * Date: 2017-August-16 * Security risk: 14/25 ( Moderately Critical) AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2] * Vulnerability: Access bypass
-------- DESCRIPTION ---------------------------------------------------------
When creating a view, you can optionally use Ajax to update the displayed data via filter parameters. The views refresh module did not restrict access to the Ajax endpoint to only views configured to use Ajax. This is mitigated if you have access restrictions on the view.
It is best practice to always include some form of access restrictions on all views, even if you are using another module to display them.
-------- CVE IDENTIFIER(S) ISSUED --------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED ---------------------------------------------------
* views fresh versions prior to 7.x-1.2.
Drupal core is not affected. If you do not use the contributed Views refresh [4] module, there is nothing you need to do.
-------- SOLUTION ------------------------------------------------------------
Install the latest version:
* If you use the views refresh module for Drupal 7.x, upgrade to views refresh 7.x-1.2 [5]
Also see the Views refresh [6] project page.
-------- REPORTED BY ---------------------------------------------------------
* Maxim Podorov [7]
-------- FIXED BY ------------------------------------------------------------
* Maxim Podorov [8] the module maintainer * Klaus Purer [9] * Daniel Wehner [10] * Michael Hess [11] of the Drupal Security Team * Len Swaneveld [12] * Wim Leers [13] * Peter Wolanin [14] of the Drupal Security Team
-------- COORDINATED BY ------------------------------------------------------
* Michael Hess [15] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION ----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact [16].
Learn more about the Drupal Security team and their policies [17], writing secure code for Drupal [18], and securing your site [19].
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity [20]
[1] https://www.drupal.org/project/views_refresh [2] https://www.drupal.org/security-team/risk-levels [3] http://cve.mitre.org/ [4] https://www.drupal.org/project/views_refresh [5] https://www.drupal.org/project/views_refresh/releases/7.x-1.2 [6] https://www.drupal.org/project/views_refresh [7] https://www.drupal.org/u/maximpodorov [8] https://www.drupal.org/u/maximpodorov [9] https://www.drupal.org/u/klausi [10] https://www.drupal.org/u/dawehner [11] https://www.drupal.org/u/mlhess [12] https://www.drupal.org/user/690914 [13] https://www.drupal.org/user/99777 [14] https://www.drupal.org/u/pwolanin [15] https://www.drupal.org/u/mlhess [16] https://www.drupal.org/contact [17] https://www.drupal.org/security-team [18] https://www.drupal.org/writing-secure-code [19] https://www.drupal.org/security/secure-configuration [20] https://twitter.com/drupalsecurity