[Security-news] AI (Artificial Intelligence) - Critical - Cross Site Request Forgery - SA-CONTRIB-2025-003
security-news at drupal.org
security-news at drupal.org
Wed Jan 15 16:09:31 UTC 2025
View online: https://www.drupal.org/sa-contrib-2025-003
Project: AI (Artificial Intelligence) [1]
Date: 2025-January-15
Security risk: *Critical* 15 ∕ 25
AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross Site Request Forgery
Affected versions: >1.0.0 <1.0.2
Description:
The Drupal AI module provides a framework for easily integrating Artificial
Intelligence on any Drupal site using any kind of AI (from multiple vendors).
The sub-modules AI Chatbot and AI Assistants API allow users to interact with
the Drupal site via a 'chat' interface.
The AI Chatbot module doesn't protect against Cross Site Request Forgeries in
the Deepchat chatbot. This could allow an attacker to craft a scenario that
can forge a request on behalf of a privileged user. When combined with the AI
Search submodule, this could result in the AI Assistant exposing indexed data
that the attacker should not have access to. When combined with the external
AI Agent module, this could result in the AI Assistant exposing and allowing
modification of site configuration of fields, content types, and
vocabularies. Sites with custom built agents, with more privileged access,
could be at greater risk from an exploit of this vulnerability.
This vulnerability is mitigated by:
* The targeted user needs to have an active session with a role with the
"access deepchat api" permission and permission to assistants.
* To extract data, the target site must have a permissive CORS policy
allowing the attacking site to read the result of a cross origin request.
* To modify data, the targeted user must have permission to use the
configured agents.
Solution:
Install the latest version:
* If you use the AI module, upgrade to AI 1.0.2 [3]
If you cannot update, you can can uninstall the AI Chatbot sub-module.
Reported By:
* Marcus Johansson [4]
Fixed By:
* Marcus Johansson [5]
* Michal Gow [6]
* Kevin Quillen [7]
* Andrew Belcher [8]
Coordinated By:
* Greg Knaddison [9] of the Drupal Security Team
* Drew Webber [10] of the Drupal Security Team
* Juraj Nemec [11] of the Drupal Security Team
[1] https://www.drupal.org/project/ai
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/ai/releases/1.0.2
[4] https://www.drupal.org/user/385947
[5] https://www.drupal.org/user/385947
[6] https://www.drupal.org/user/3065779
[7] https://www.drupal.org/user/317279
[8] https://www.drupal.org/user/655282
[9] https://www.drupal.org/user/36762
[10] https://www.drupal.org/u/mcdruid
[11] https://www.drupal.org//www.drupal.org/u/poker10
More information about the Security-news
mailing list