[Security-news] Services - Critical - SQL Injection - SA-CONTRIB-2019-026

security-news at drupal.org security-news at drupal.org
Wed Feb 27 18:10:19 UTC 2019


View online: https://www.drupal.org/sa-contrib-2019-026

Project: Services [1]
Version: 7.x-3.x-dev
Date: 2019-February-27
Security risk: *Critical* 19∕25
AC:None/A:None/CI:All/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: SQL Injection

Description: 
This module provides a standardized solution for building API's so that
external clients can communicate with Drupal.

The module doesn't sufficiently sanitize user input for entity index
resources thus allowing SQL Injection attacks.

This vulnerability is mitigated by the fact that the Drupal 7 site must have
an "index" resource(s) enabled under the Services endpoint configuration
(admin/structure/services/list/MY-ENDPOINT/resources) and an attacker must
know the endpoint's machine name.

Install the 7.x-3.22 [3] version of the Services module for the fix, or
simply disable any "index" resources to stop the attack vector.

Solution: 
Install the latest version:

   * If you use the 7.x-3.x Services module for Drupal, upgrade to Services
     7.x-3.22 [4]

Reported By: 
   * Samuel Mortenson [5] of the Drupal Security Team

Fixed By: 
   * Tyler Frankenstein [6]
   * Samuel Mortenson [7] of the Drupal Security Team
   * Ivo Van Geertruyen [8] of the Drupal Security Team

Coordinated By: 
   * Samuel Mortenson [9] of the Drupal Security Team


[1] https://www.drupal.org/project/services
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/services/releases/7.x-3.22
[4] https://www.drupal.org/project/services/releases/7.x-3.22
[5] https://www.drupal.org/user/2582268
[6] https://www.drupal.org/user/150680
[7] https://www.drupal.org/user/2582268
[8] https://www.drupal.org/user/383424
[9] https://www.drupal.org/user/2582268



More information about the Security-news mailing list