[Security-news] SA-CONTRIB-2014-060- Petitions - Cross Site Request Forgery (CSRF)

security-news at lists.drupal.org security-news at lists.drupal.org
Wed Jun 11 19:09:52 UTC 2014


View online: https://drupal.org/node/2284571

   * Advisory ID: DRUPAL-SA-CONTRIB-2014-060
   * Project: - Petitions - [1] (third-party distribution)
   * Version: 7.x
   * Date: 2014-June-11
   * Security risk: Less critical [2]
   * Exploitable from: Remote
   * Vulnerability: Cross Site Request Forgery

-------- DESCRIPTION
---------------------------------------------------------

This distribution enables you to build an application that lets users create
and sign petitions.
The contained wh_petitions module doesn't sufficiently verify the intent of
the user when signing a petition. A malicious user could trick another user
into signing a petition they did not intend to sign by getting them to visit
a specially-crafted URL while logged in.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * petitions 7.x-1.x versions prior to 7.x-1.2.

Drupal core is not affected. If you do not use the contributed - Petitions -
[4] distribution, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the petitions distribution for Drupal 7.x, upgrade to 
petitions
     7.x-1.2 [5] or petitions 7.x-2.0-beta19 [6]

Note that petitions 7.x-1.2 [7] is the last release for the first version of
petitions. petitions 7.x-1.x is no longer maintained, and you are strongly
encouraged to upgrade to the latest version petitions 7.x-2.0-beta19 [8].
Also see the - Petitions - [9] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Greg Knaddison [10] of the Drupal Security Team

-------- FIXED BY
------------------------------------------------------------

   * Steve Wirt [11]

-------- COORDINATED BY
------------------------------------------------------

   * Stéphane Corlosquet [12] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [13].

Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and securing your site [16].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [17]


[1] http://drupal.org/project/petitions
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/petitions
[5] https://drupal.org/node/2284505
[6] https://drupal.org/node/1995992
[7] https://drupal.org/node/2284505
[8] https://drupal.org/node/1995992
[9] http://drupal.org/project/petitions
[10] https://drupal.org/u/greggles
[11] https://drupal.org/user/138230
[12] https://drupal.org/u/scor
[13] http://drupal.org/contact
[14] http://drupal.org/security-team
[15] http://drupal.org/writing-secure-code
[16] http://drupal.org/security/secure-configuration
[17] https://twitter.com/drupalsecurity



More information about the Security-news mailing list