[Security-news] SA-CONTRIB-2013-068 - Entity API - Access Bypass

security-news at drupal.org security-news at drupal.org
Wed Aug 14 19:55:31 UTC 2013


View online: https://drupal.org/node/2065207

  * Advisory ID: DRUPAL-SA-CONTRIB-2013-068
  * Project: Entity API [1] (third-party module)
  * Version: 7.x
  * Date: 2013-August-14
  * Security risk: Moderately critical [2]
  * Exploitable from: Remote
  * Vulnerability: Access bypass

-------- DESCRIPTION  
---------------------------------------------------------

The Entity API module extends the entity API of Drupal core in order to
provide a unified way to deal with entities and their properties.

The module doesn't sufficiently enforce node access restrictions when
checking for a user's access to view a comment associated with a particular
node. The vulnerability is mitigated by the fact that it only applies to a
user's access to view a comment in a situation where access should be
restricted with entity access.

The Entity API also does not properly restrict access when displaying
selected entities using the Views field or area plugins, allowing users to
view entities that they do not have access to. The vulnerability is mitigated
by the fact that entities are only improperly exposed when a View has been
configured to display them in a field, header or footer of a View.


-------- CVE IDENTIFIER(S) ISSUED  
--------------------------------------------

  * /A CVE identifier [3] will be requested, and added upon issuance, in
    accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED  
---------------------------------------------------

  * Entity API 7.x-1.x versions prior to 7.x-1.2

Drupal core is not affected. If you do not use the contributed Entity API [4]
module, there is nothing you need to do.

-------- SOLUTION  
------------------------------------------------------------

Install the latest version:

  * If you use the Entity API module for Drupal 7.x, upgrade to Entity API
    7.x-1.2 [5]

Also see the Entity API [6] project page.

-------- REPORTED BY  
---------------------------------------------------------

The comment access bypass was reported by:
  * tanius [7]
  * Ezra Barnett Gildesgame [8]

The Views header/footer access bypass was reported by:
  * Derek Ahmedzai [9]
  * Daniel Wehner [10]

-------- FIXED BY  
------------------------------------------------------------

  * Devin Carlson [11]
  * Jakob Perry [12]
  * Daniel Wehner [13]
  * Wolfgang Ziegler [14], the module maintainer

-------- COORDINATED BY  
------------------------------------------------------

  * Klaus Purer [15] of the Drupal Security Team
  * Greg Knaddison [16] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION  
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [17].

Learn more about the Drupal Security team and their policies [18], writing
secure code for Drupal [19], and securing your site [20].


[1] http://drupal.org/project/entity
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/entity
[5] https://drupal.org/node/2065197
[6] http://drupal.org/project/entity
[7] https://drupal.org/user/2478456
[8] https://drupal.org/user/69959
[9] https://drupal.org/user/167927
[10] https://drupal.org/user/99340
[11] https://drupal.org/user/290182
[12] https://drupal.org/user/45640
[13] https://drupal.org/user/99340
[14] https://drupal.org/user/16747
[15] http://drupal.org/user/262198
[16] http://drupal.org/user/36762
[17] http://drupal.org/contact
[18] http://drupal.org/security-team
[19] http://drupal.org/writing-secure-code
[20] http://drupal.org/security/secure-configuration



More information about the Security-news mailing list