[Security-news] SA-CONTRIB-2009-017 - Vote Up/Down - Cross-site request forgery

security-news at drupal.org security-news at drupal.org
Wed Mar 25 21:43:53 UTC 2009


  * Advisory ID: DRUPAL-SA-CONTRIB-2009-017
  * Project: Vote Up/Down (third-party module)
  * Version: 5.x, 6.x
  * Date: 2009-March-25
  * Security risk: Not critical
  * Exploitable from: Remote
  * Vulnerability: Cross-site request forgery

-------- DESCRIPTION  
---------------------------------------------------------

The Vote Up/Down module provides a voting widget for content that records
votes using Ajax. The URL for voting is vulnerable to cross-site request
forgeries (CSRF [1]) making it possible for users to unknowingly vote for
content.
-------- VERSIONS AFFECTED  
---------------------------------------------------

  * Vote Up/Down 5.x-1.x prior to 5.x-1.1
  * Vote Up/Down 6.x-1.x prior to 6.x-1.0-beta4

Drupal core is not affected. If you do not use the contributed Vote Up/Down
module, there is nothing you need to do.
-------- SOLUTION  
------------------------------------------------------------

Install the latest version:
  * If you use Vote Up/Down 5.x-1.x upgrade to Vote Up/Down 5.x-1.1 [2]
  * If you use Vote Up/Down 6.x-1.x upgrade to Vote Up/Down 6.x-1.0-beta4 [3]

See also the Vote Up/Down project page [4].
-------- REPORTED BY  
---------------------------------------------------------

Alexandr Shvets [5].
-------- FIXED BY  
------------------------------------------------------------

Pratul Kalia [6].
-------- CONTACT  
-------------------------------------------------------------

The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.

[1] http://en.wikipedia.org/wiki/Csrf
[2] http://drupal.org/node/413818
[3] http://drupal.org/node/413896
[4] http://drupal.org/project/vote_up_down
[5] http://drupal.org/user/233667
[6] http://drupal.org/user/162357



More information about the Security-news mailing list