[Security-news] HTTP Strict Transport Security - Moderately Critical - Logical Error - SA-CONTRIB-2015-118
security-news at drupal.org
security-news at drupal.org
Wed Jun 17 16:38:51 UTC 2015
View online: https://www.drupal.org/node/2507563
* Advisory ID: DRUPAL-SA-CONTRIB-2015-118
* Project: HTTP Strict Transport Security [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2015-June-17
* Security risk: 12/25 ( Moderately Critical)
AC:Complex/A:None/CI:Some/II:None/E:Theoretical/TD:All [2]
* Vulnerability: Multiple vulnerabilities
-------- DESCRIPTION
---------------------------------------------------------
The contributed HSTS module makes it easy for site administrators to
implement HTTP Strict Transport Security (HSTS) by setting the
Strict-Transport-Security header on each page generated by Drupal.
HSTS module provides a configuration UI for the HSTS "include subdomains"
directive, which indicates that the browser should apply the HSTS policy to
all subdomains on the site's domain.
HSTS module did not implement the "include subdomains" directive correctly
(it is misspelled as include_subdomains rather than includeSubDomains). As a
result, the HSTS policy was not applied to subdomains as site administrators
had expected.
This vulnerability is mitigated by the fact that only subdomains where HSTS
was expected to be enabled are affected and an attacker would still need to
execute a man-in-the-middle attack to exploit the issue.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* HSTS 7.x-1.x versions prior to 7.x-1.2.
* HSTS 6.x-1.x versions prior to 6.x-1.1.
Drupal core is not affected. If you do not use the contributed HTTP Strict
Transport Security [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the HSTS module for Drupal 7.x, upgrade to HSTS 7.x-1.2 [5]
* If you use the HSTS module for Drupal 6.x, upgrade to HSTS 6.x-1.1 [6]
Also see the HTTP Strict Transport Security [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Mark Burdett [8]
-------- FIXED BY
------------------------------------------------------------
* Mark Burdett [9]
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] https://www.drupal.org/project/hsts
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/hsts
[5] https://www.drupal.org/node/2507539
[6] https://www.drupal.org/node/2507543
[7] https://www.drupal.org/project/hsts
[8] https://www.drupal.org/user/12302
[9] https://www.drupal.org/user/12302
[10] https://www.drupal.org/user/36762
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity
More information about the Security-news
mailing list