[Security-news] Nodejs - Access bypass - Moderately Critical -- DRUPAL-SA-CONTRIB-2016-007

security-news at drupal.org security-news at drupal.org
Wed Feb 17 18:14:31 UTC 2016


View online: https://www.drupal.org/node/2670636

   * Advisory ID: DRUPAL-SA-CONTRIB-2016-007
   * Project: Node.js integration [1]     (third-party module)
   * Version: 7.x, 8.x
   * Date: 2016-February-17
   * Security risk: 13/25 ( Moderately Critical)
     AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:All [2]
   * Vulnerability: Information Disclosure

-------- DESCRIPTION
---------------------------------------------------------

This module provides an API that other modules can use to add realtime
capabilities to Drupal, specifically enabling pushing updates to open
connected clients.

The module doesn't disconnect unauthenticated sockets, allowing those sockets
to receive broadcast messages. For sites that only serve authenticated pages,
or only allows Node.js connections from authenticated users, the expectation
is that only authenticated Drupal users will see broadcast messages.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * Node.js 7.x-1.x versions prior to 7.x-1.11.
   * Node.js 8.x-1.x beta versions prior to 8.x-1.0.

Drupal core is not affected. If you do not use the contributed Node.js
integration [4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the Node.js module for Drupal 7.x, upgrade to Node.js 
7.x-1.11.
     [5]
   * If you use the beta Node.js module for Drupal 8.x, upgrade to Node.js
     8.x-1.0. [6]

Also see the Node.js integration [7] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Justin Randell [8].

-------- FIXED BY
------------------------------------------------------------

   * Justin Randell [9].
   * Gergely Lekli [10].

-------- COORDINATED BY
------------------------------------------------------

   * Michael Hess [11] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].

Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and  securing your site [15].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]


[1] https://www.drupal.org/project/nodejs
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/nodejs
[5] https://www.drupal.org/node/2669222
[6] https://www.drupal.org/node/2669224
[7] https://www.drupal.org/project/nodejs
[8] https://www.drupal.org/u/beejeebus
[9] https://www.drupal.org/u/beejeebus
[10] https://www.drupal.org/u/gergely-lekli
[11] https://www.drupal.org/u/mlhess
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity



More information about the Security-news mailing list