[Security-news] SA-CONTRIB-2015-079 - Chaos tool suite (ctools) - Multiple vulnerabilities

security-news at drupal.org security-news at drupal.org
Wed Mar 18 20:06:44 UTC 2015


View online: https://www.drupal.org/node/2454909

   * Advisory ID: DRUPAL-SA-CONTRIB-2015-079
   * Project: Chaos tool suite (ctools) [1]     (third-party module)
   * Version: 6.x, 7.x
   * Date: 2015-March-18
   * Security risk: 13/25 (Moderately Critical)
     AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:All [2]
   * Vulnerability: Access bypass, Open Redirect

-------- DESCRIPTION
---------------------------------------------------------

This module provides a set of APIs and tools to improve the developer
experience.

.... Access bypass in autocomplete (Drupal 7 only)

Among other many other things, CTools provides an autocomplete callback for
finding entities by their titles or ID.

In CTools version 1.5, additional checks were created to defend against
leaking titles for entities that the user doesn't have access to. However,
certain edge cases were found to leak this private data.

This vulnerability is mitigated by the fact that you must perform the
autocomplete search on custom entities that don't include an access query
tag, or you must know the ID of the entity whose title you are trying to get.

.... Open redirect in confirmation pages (Drupal 6 and 7)

Also, CTools did not sanitize user provided URLs when processing confirmation
delete pages, thereby exposing an open redirect attack vector.

This vulnerability is mitigated by the fact that a module using CTools must
allow for users to insert a malicious external URL that is sent to the
confirmation page.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * CTools 6.x-1.x versions prior to 6.x-1.12.
   * CTools 7.x-1.x versions prior to 7.x-1.7.

Drupal core is not affected. If you do not use the contributed Chaos tool
suite (ctools) [4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the CTools module for Drupal 6.x, upgrade to CTools 6.x-1.12
     [5]
   * If you use the CTools module for Drupal 7.x, upgrade to CTools 7.x-1.7 
[6]

Also see the Chaos tool suite (ctools) [7] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Richard Thomas [8]
   * Pere Orga [9] of the Drupal Security Team

-------- FIXED BY
------------------------------------------------------------

   * Jakob Perry [10], the module maintainer
   * Richard Thomas [11]

-------- COORDINATED BY
------------------------------------------------------

   * David Snopek [12] of the Drupal Security Team
   * Pere Orga [13] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [14].

Learn more about the Drupal Security team and their policies [15], writing
secure code for Drupal [16], and  securing your site [17].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [18]


[1] https://www.drupal.org/project/ctools
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/ctools
[5] https://www.drupal.org/node/2454885
[6] https://www.drupal.org/node/2454883
[7] https://www.drupal.org/project/ctools
[8] https://www.drupal.org/user/1924680
[9] https://www.drupal.org/user/2301194
[10] https://www.drupal.org/user/45640
[11] https://www.drupal.org/user/1924680
[12] https://www.drupal.org/user/266527
[13] https://www.drupal.org/user/2301194
[14] https://www.drupal.org/contact
[15] https://www.drupal.org/security-team
[16] https://www.drupal.org/writing-secure-code
[17] https://www.drupal.org/security/secure-configuration
[18] https://twitter.com/drupalsecurity



More information about the Security-news mailing list