[Security-news] Mollom - Critical - Access bypass - SA-CONTRIB-2015-168

security-news at drupal.org security-news at drupal.org
Wed Dec 2 21:05:12 UTC 2015


View online: https://www.drupal.org/node/2627448

   * Advisory ID: DRUPAL-SA-CONTRIB-2015-168
   * Project: Mollom [1]     (third-party module)
   * Version: 6.x
   * Date: 2015-December-02
   * Security risk: 16/25 ( Critical)
     AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
   * Vulnerability: Access bypass

-------- DESCRIPTION
---------------------------------------------------------

The Mollom module allows users to protect their website from spam.  As part
of the spam protection, Mollom enables the website administrator to create a
blacklist.  When content is submitted that matches terms on the black list it
will be automatically marked as spam and rejected per the site configuration.

The module doesn't sufficiently check for access when accessing or modifying
the blacklist for the site.  This enables a potential attacker to add,
update, or remove their own terms to a site-wide blacklist.  The potential
exists for an attacker to remove existing blacklist terms which could allow
their content to be accepted onto the site.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * Mollom 6.x-2.x versions between 6.x-2.7 through 6.x-2.14.

This does not affect the modules for Drupal 7 or Drupal 8.

Drupal core is not affected. If you do not use the contributed Mollom [4]
module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the Mollom module for Drupal 6.x, upgrade to Mollom 6.x-2.15
     [5]

Also see the Mollom [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Nick Veenhof [7], module maintainer

-------- FIXED BY
------------------------------------------------------------

   * Nick Veenhof [8], module maintainer

-------- COORDINATED BY
------------------------------------------------------

   * Pere Orga [9] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [10].

Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and  securing your site [13].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [14]


[1] https://www.drupal.org/project/mollom
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/mollom
[5] https://www.drupal.org/node/2626872
[6] https://www.drupal.org/project/mollom
[7] https://www.drupal.org/user/122682
[8] https://www.drupal.org/user/122682
[9] https://www.drupal.org/user/2301194
[10] https://www.drupal.org/contact
[11] https://www.drupal.org/security-team
[12] https://www.drupal.org/writing-secure-code
[13] https://www.drupal.org/security/secure-configuration
[14] https://twitter.com/drupalsecurity



More information about the Security-news mailing list