[Security-news] Phone Field - Critical - SQL Injection - SA-CONTRIB-2019-001
security-news at drupal.org
security-news at drupal.org
Wed Jan 9 20:13:27 UTC 2019
View online: https://www.drupal.org/sa-contrib-2019-001
Project: Phone Field [1]
Date: 2019-January-09
Security risk: *Critical* 16∕25
AC:Basic/A:User/CI:All/II:All/E:Theoretical/TD:Uncommon [2]
Vulnerability: SQL Injection
Description:
This module provides a phone field for Drupal 7 that supports the HTML5
tel:-schema.
In an API function that is not used by the module, the name for the phone
field is not sufficiently sanitised when using it in database queries.
This vulnerability is mitigated by the fact that it affects an unused
function. A site is only vulnerable if it has custom code that uses the
phonefield_get_entity_id() function and exposes control over the $field
parameter to visitors to the site.
Solution:
Install the latest version:
* If you use the phonefield module for Drupal 7.x, upgrade to phonefield
7.x-1.1 [3]
Also see the Phone Field [4] project page.
Reported By:
* Drew Webber [5]
Fixed By:
* Drew Webber [6]
* Gisle Hannemyr [7]
Coordinated By:
* Greg Knaddison [8] of the Drupal Security Team
* Drew Webber [9]
[1] https://www.drupal.org/project/phonefield
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/phonefield/releases/7.x-1.1
[4] https://www.drupal.org/project/phonefield
[5] https://www.drupal.org/user/255969
[6] https://www.drupal.org/user/255969
[7] https://www.drupal.org/user/409554
[8] https://www.drupal.org/user/36762
[9] https://www.drupal.org/user/255969
More information about the Security-news
mailing list