[Security-news] SA-CONTRIB-2014-060- Petitions - Cross Site Request Forgery (CSRF)
security-news at lists.drupal.org
security-news at lists.drupal.org
Wed Jun 11 19:09:52 UTC 2014
View online: https://drupal.org/node/2284571
* Advisory ID: DRUPAL-SA-CONTRIB-2014-060
* Project: - Petitions - [1] (third-party distribution)
* Version: 7.x
* Date: 2014-June-11
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Request Forgery
-------- DESCRIPTION
---------------------------------------------------------
This distribution enables you to build an application that lets users create
and sign petitions.
The contained wh_petitions module doesn't sufficiently verify the intent of
the user when signing a petition. A malicious user could trick another user
into signing a petition they did not intend to sign by getting them to visit
a specially-crafted URL while logged in.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* petitions 7.x-1.x versions prior to 7.x-1.2.
Drupal core is not affected. If you do not use the contributed - Petitions -
[4] distribution, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the petitions distribution for Drupal 7.x, upgrade to
petitions
7.x-1.2 [5] or petitions 7.x-2.0-beta19 [6]
Note that petitions 7.x-1.2 [7] is the last release for the first version of
petitions. petitions 7.x-1.x is no longer maintained, and you are strongly
encouraged to upgrade to the latest version petitions 7.x-2.0-beta19 [8].
Also see the - Petitions - [9] project page.
-------- REPORTED BY
---------------------------------------------------------
* Greg Knaddison [10] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Steve Wirt [11]
-------- COORDINATED BY
------------------------------------------------------
* Stéphane Corlosquet [12] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [13].
Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and securing your site [16].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [17]
[1] http://drupal.org/project/petitions
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/petitions
[5] https://drupal.org/node/2284505
[6] https://drupal.org/node/1995992
[7] https://drupal.org/node/2284505
[8] https://drupal.org/node/1995992
[9] http://drupal.org/project/petitions
[10] https://drupal.org/u/greggles
[11] https://drupal.org/user/138230
[12] https://drupal.org/u/scor
[13] http://drupal.org/contact
[14] http://drupal.org/security-team
[15] http://drupal.org/writing-secure-code
[16] http://drupal.org/security/secure-configuration
[17] https://twitter.com/drupalsecurity
More information about the Security-news
mailing list