[Security-news] Views refresh - Moderately Critical - Access Bypass - DRUPAL-SA-CONTRIB-2017-069

security-news at drupal.org security-news at drupal.org
Wed Aug 16 17:31:40 UTC 2017


View online: https://www.drupal.org/node/2902606

   * Advisory ID: DRUPAL-SA-CONTRIB-2017-069
   * Project: Views Refresh [1]     (third-party module)
   * Version: 7.x, 8.x
   * Date: 2017-August-16
   * Security risk: 14/25 ( Moderately Critical)
     AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
   * Vulnerability: Access bypass

-------- DESCRIPTION
---------------------------------------------------------

When creating a view, you can optionally use Ajax to update the displayed
data via filter parameters.  The views refresh module  did not restrict
access to the Ajax endpoint to only views configured to use Ajax.  This is
mitigated if you have access restrictions on the view.

It is best practice to always include some form of access restrictions on all
views, even if you are using another module to display them.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * views  fresh versions prior to 7.x-1.2.

Drupal core is not affected. If you do not use the contributed Views refresh
[4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the views refresh module for Drupal 7.x, upgrade to views
     refresh 7.x-1.2 [5]

Also see the Views refresh [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Maxim Podorov [7]

-------- FIXED BY
------------------------------------------------------------

   * Maxim Podorov [8] the module maintainer
   * Klaus Purer [9]
   * Daniel Wehner [10]
   * Michael Hess [11] of the Drupal Security Team
   * Len Swaneveld [12]
   * Wim Leers [13]
   * Peter Wolanin [14] of the Drupal Security Team

-------- COORDINATED BY
------------------------------------------------------

   * Michael Hess [15] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [16].

Learn more about the Drupal Security team and their policies [17], writing
secure code for Drupal [18], and  securing your site [19].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [20]


[1] https://www.drupal.org/project/views_refresh
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/views_refresh
[5] https://www.drupal.org/project/views_refresh/releases/7.x-1.2
[6] https://www.drupal.org/project/views_refresh
[7] https://www.drupal.org/u/maximpodorov
[8] https://www.drupal.org/u/maximpodorov
[9] https://www.drupal.org/u/klausi
[10] https://www.drupal.org/u/dawehner
[11] https://www.drupal.org/u/mlhess
[12] https://www.drupal.org/user/690914
[13] https://www.drupal.org/user/99777
[14] https://www.drupal.org/u/pwolanin
[15] https://www.drupal.org/u/mlhess
[16] https://www.drupal.org/contact
[17] https://www.drupal.org/security-team
[18] https://www.drupal.org/writing-secure-code
[19] https://www.drupal.org/security/secure-configuration
[20] https://twitter.com/drupalsecurity



More information about the Security-news mailing list