it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Twitter - Moderately Critical - Access bypass - SA-CONTRIB-2015-146
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Twitter - Moderately Critical - Access bypass - SA-CONTRIB-2015-146
- Date: Wed, 9 Sep 2015 19:19:17 +0000 (UTC)
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
View online: https://www.drupal.org/node/2565827
* Advisory ID: DRUPAL-SA-CONTRIB-2015-146
* Project: Twitter [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2015-September-09
* Security risk: 12/25 ( Moderately Critical)
AC:Basic/A:User/CI:None/II:Some/E:Exploit/TD:Uncommon [2]
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
This module enables you to pull in public tweets from Twitter accounts, post
messages to Twitter to announce content changes, and authenticate using
Twitter.
The module doesn't sufficiently check for access when using the Twitter Post
submodule to post messages to Twitter and allows a tweet to be posted to any
authenticated account, not just one that the user owns.
The module also doesn't sufficiently check for access when listing a user's
connected Twitter accounts, allowing any user to change the options for any
other account, including deleting the attached Twitter account.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "post to twitter" in order to post to Twitter, and have
either the permission "add twitter accounts" or "add authenticated twitter
accounts" in order to access the accounts list.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Twitter 6.x-5.x versions prior to 6.x-5.2.
* Twitter 7.x-5.x versions prior to 7.x-5.9.
* Twitter 7.x-6.x versions prior to 7.x-6.0.
Drupal core is not affected. If you do not use the contributed Twitter [4]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Twitter 5.x module for Drupal 6.x, upgrade to Twitter
6.x-5.2 [5] or later.
* If you use the Twitter 5.x module for Drupal 7.x, upgrade to Twitter
7.x-5.9 [6] or later.
* If you use the Twitter 6.x module for Drupal 7.x, upgrade to Twitter
7.x-6.0 [7] or later.
Also see the Twitter [8] project page.
-------- REPORTED BY
---------------------------------------------------------
* Chris Car [9]
* Carl Bowles [10]
* Stein Magne Bjørklund [11]
* Omnia Ibrahim [12]
* Daniel Roman Sabate [13]
* mshepherd [14]
* voughndutch [15]
-------- FIXED BY
------------------------------------------------------------
* adirael [16]
* arcovia [17]
* Michael Nielson [18]
* Damien McKenna [19], the module maintainer.
-------- COORDINATED BY
------------------------------------------------------
* David Snopek [20] of the Drupal Security Team.
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [21].
Learn more about the Drupal Security team and their policies [22], writing
secure code for Drupal [23], and securing your site [24].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [25]
[1] https://www.drupal.org/project/twitter
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/twitter
[5] https://www.drupal.org/node/2559989
[6] https://www.drupal.org/node/2559981
[7] https://www.drupal.org/node/2559985
[8] https://www.drupal.org/project/twitter
[9] https://www.drupal.org/u/chris_car
[10] https://www.drupal.org/u/carlbowles100
[11] https://www.drupal.org/u/steinmb
[12] https://www.drupal.org/u/omnia.ibrahim
[13] https://www.drupal.org/u/dromansab
[14] https://www.drupal.org/u/mshepherd
[15] https://www.drupal.org/user/1374418
[16] https://www.drupal.org/u/adirael
[17] https://www.drupal.org/u/arcovia
[18] https://www.drupal.org/u/nielsonm
[19] https://www.drupal.org/u/damienmckenna
[20] https://www.drupal.org/u/dsnopek
[21] https://www.drupal.org/contact
[22] https://www.drupal.org/security-team
[23] https://www.drupal.org/writing-secure-code
[24] https://www.drupal.org/security/secure-configuration
[25] https://twitter.com/drupalsecurity
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Twitter - Moderately Critical - Access bypass - SA-CONTRIB-2015-146, security-news, 09.09.2015
Archiv bereitgestellt durch MHonArc 2.6.19.