[Security-news] Fast Autocomplete - Critical - DOS vulnerability - SA-CONTRIB-2016-016

security-news at drupal.org security-news at drupal.org
Wed Mar 16 17:17:34 UTC 2016


View online: https://www.drupal.org/node/2688461

   * Advisory ID: DRUPAL-SA-CONTRIB-2016-016
   * Project: Fast Autocomplete [1]     (third-party module)
   * Version: 7.x
   * Date: 2016-March-16
   * Security risk: 12/25 ( Moderately Critical)
     AC:None/A:None/CI:None/II:None/E:Theoretical/TD:All [2]
   * Vulnerability: Denial of Service

-------- DESCRIPTION
---------------------------------------------------------

This module enables you to show IMDB-like suggestions when entering terms
into an input field using json files to "cache" suggestions making the
autocomplete very fast.

The module doesn't sufficiently validate the incoming language parameter in
the request path when a json file of the module is requested resulting in
folders being created in the public files directory where the module stores
its json files. This vulnerability can be exploited to perform a DOS-attack
by depletion of available inodes on the webserver.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * Fast Autocomplete 7.x-1.x versions prior to 7.x-1.1.

Drupal core is not affected. If you do not use the contributed Fast
Autocomplete [4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the Fast Autocomplete module for Drupal 7.x, upgrade to Fast
     Autocomplete 7.x-1.1 [5]

Also see the Fast Autocomplete [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Martijn van Wensen [7]

-------- FIXED BY
------------------------------------------------------------

   * Martijn van Wensen [8] providing the patch
   * Baris Wanschers [9] reviewing/refining the patch
   * Martijn Vermeulen [10] the module maintainer

-------- COORDINATED BY
------------------------------------------------------

   * Pere Orga [11] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].

Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and  securing your site [15].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]


[1] https://www.drupal.org/project/fac
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/fac
[5] https://www.drupal.org/node/2688365
[6] https://www.drupal.org/project/fac
[7] https://www.drupal.org/u/mvwensen
[8] https://www.drupal.org/u/mvwensen
[9] https://www.drupal.org/u/barisw
[10] https://www.drupal.org/u/marty2081
[11] https://www.drupal.org/u/pere-orga
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity



More information about the Security-news mailing list