[Security-news] SA-CONTRIB-2014-074 - Storage API - Code execution prevention

security-news at drupal.org security-news at drupal.org
Wed Jul 30 19:45:20 UTC 2014


View online: https://www.drupal.org/node/2312769

   * Advisory ID: DRUPAL-SA-CONTRIB-2014-074
   * Project:
     (third-party module)
   * Version: 7.x
   * Date: 2014-July-30
   * Security risk: (Less Critical) [1]
   * Vulnerability: Arbitrary PHP code execution

-------- DESCRIPTION
---------------------------------------------------------

Storage API is a low-level framework for managed file storage and serving.

The module creates an .htaccess file in the files directory to prevent code
execution, but copied the Drupal core file and wasn't updated to include the
improved file contents after SA-CORE-2013-003 [2].

This vulnerability is mitigated by the fact that it only relates to a defense
in depth mechanism, and sites would only be vulnerable if they are hosted on
a server which contains code that does not use protections similar to those
found in Drupal's file API to manage uploads in a safe manner.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance
            with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

Drupal core is not affected. If you do not use the contributed
module,
       there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the Storage API module for Drupal 7.x, upgrade to Storage API
     7.x-1.6 [4]

Also see the
project page.

-------- REPORTED BY
---------------------------------------------------------

Reported publicly outside the Drupal Security Team reporting process [5].

-------- FIXED BY
------------------------------------------------------------

   * Jonathan Brown [6] and Brady Owens [7] the module maintainers

-------- COORDINATED BY
------------------------------------------------------

   * Klaus Purer [8] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [9].

Learn more about the Drupal Security team and their policies [10], writing
secure code for Drupal [11], and securing your site [12].


[1] http://drupal.org/security-team/risk-levels
[2] https://www.drupal.org/SA-CORE-2013-003
[3] http://cve.mitre.org/
[4] https://www.drupal.org/node/2312655
[5] https://www.drupal.org/node/101494
[6] http://drupal.org/user/46104
[7] https://www.drupal.org/user/1547200
[8] https://www.drupal.org/user/262198
[9] http://drupal.org/contact
[10] http://drupal.org/security-team
[11] http://drupal.org/writing-secure-code
[12] http://drupal.org/security/secure-configuration



More information about the Security-news mailing list