[Security-news] RESTful - Moderately Critical - Access bypass - SA-CONTRIB-2015-147

security-news at drupal.org security-news at drupal.org
Wed Sep 9 19:18:28 UTC 2015


View online: https://www.drupal.org/node/2565875

   * Advisory ID: DRUPAL-SA-CONTRIB-2015-147
   * Project: RESTful [1]     (third-party module)
   * Version: 7.x
   * Date: 2015-September-09
   * Security risk: 12/25 ( Moderately Critical)
     AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
   * Vulnerability: Access bypass

-------- DESCRIPTION
---------------------------------------------------------

This module enables you to expose your Drupal backend by generating a RESTful
API.

The module doesn't sufficiently account for core's page cache generation for
anonymous users, when using non-cookie authentication providers.
Authenticated users, via one of the authentication providers, can have their
pages cached as anonymous users, and therefore allowing access to potentially
restricted information during subsequent anonymous requests.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * RESTful 7.x-1.x versions prior to 7.x-1.3.

Drupal core is not affected. If you do not use the contributed RESTful [4]
module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the RESTful module for Drupal 7.x, upgrade to RESTful 7.x-1.3
     [5]

Also see the RESTful [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Richard Thomas [7]

-------- FIXED BY
------------------------------------------------------------

   * Mateu Aguiló [8] the module maintainer
   * Lee Rowlands [9] of the Drupal Security Team

-------- COORDINATED BY
------------------------------------------------------

   * Lee Rowlands [10] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].

Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and  securing your site [14].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]


[1] https://www.drupal.org/project/restful
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/restful
[5] https://www.drupal.org/node/2565421
[6] https://www.drupal.org/project/restful
[7] https://www.drupal.org/user/1924680
[8] https://www.drupal.org/user/550110
[9] https://www.drupal.org/user/395439
[10] https://www.drupal.org/user/395439
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity



More information about the Security-news mailing list