[Security-news] SA-CONTRIB-2010-056 - User Queue - Cross Site Request Forgery
security-news at drupal.org
security-news at drupal.org
Thu May 20 00:13:34 UTC 2010
* Advisory ID: DRUPAL-SA-CONTRIB-2010-056
* Project: User Queue (third-party module)
* Versions: 6.x
* Date: 2010-May-19
* Security risk: Less Critical
* Exploitable from: Remote
* Vulnerability: Cross-site Request Forgery
-------- DESCRIPTION
---------------------------------------------------------
The User Queue module allows you to create multiple queues, add users to
them, and order the users within the queue. The module is vulnerable to
cross-site request forgeries (CSRF [1]) via the URL used to delete users from
the queue. A user with "administer user queues" permission could be
manipulated into requesting this URL and removing any user from the queue.
-------- VERSIONS AFFECTED
---------------------------------------------------
* User Queue module for Drupal 6.x version prior to 6.x-1.1.
Drupal core is not affected. If you do not use the contributed User Queue
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version.
* If you use the User Queue module for Drupal 6.x upgrade to User Queue
6.x-1.1 [2]
See also the User Queue project page [3].
-------- REPORTED BY
---------------------------------------------------------
* George Gongadze [4]
-------- FIXED BY
------------------------------------------------------------
* Matt Johnson [5], the module maintainer
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact [6].
[1] http://en.wikipedia.org/wiki/Csrf
[2] http://drupal.org/node/803842
[3] http://drupal.org/project/userqueue
[4] http://drupal.org/user/322910
[5] http://drupal.org/user/169600
[6] http://drupal.org/contact
More information about the Security-news
mailing list