it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Views refresh - Moderately Critical - Access Bypass - DRUPAL-SA-CONTRIB-2017-069
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Views refresh - Moderately Critical - Access Bypass - DRUPAL-SA-CONTRIB-2017-069
- Date: Wed, 16 Aug 2017 17:31:40 +0000 (UTC)
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/node/2902606
* Advisory ID: DRUPAL-SA-CONTRIB-2017-069
* Project: Views Refresh [1] (third-party module)
* Version: 7.x, 8.x
* Date: 2017-August-16
* Security risk: 14/25 ( Moderately Critical)
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
When creating a view, you can optionally use Ajax to update the displayed
data via filter parameters. The views refresh module did not restrict
access to the Ajax endpoint to only views configured to use Ajax. This is
mitigated if you have access restrictions on the view.
It is best practice to always include some form of access restrictions on all
views, even if you are using another module to display them.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* views fresh versions prior to 7.x-1.2.
Drupal core is not affected. If you do not use the contributed Views refresh
[4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the views refresh module for Drupal 7.x, upgrade to views
refresh 7.x-1.2 [5]
Also see the Views refresh [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Maxim Podorov [7]
-------- FIXED BY
------------------------------------------------------------
* Maxim Podorov [8] the module maintainer
* Klaus Purer [9]
* Daniel Wehner [10]
* Michael Hess [11] of the Drupal Security Team
* Len Swaneveld [12]
* Wim Leers [13]
* Peter Wolanin [14] of the Drupal Security Team
-------- COORDINATED BY
------------------------------------------------------
* Michael Hess [15] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [16].
Learn more about the Drupal Security team and their policies [17], writing
secure code for Drupal [18], and securing your site [19].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [20]
[1] https://www.drupal.org/project/views_refresh
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/views_refresh
[5] https://www.drupal.org/project/views_refresh/releases/7.x-1.2
[6] https://www.drupal.org/project/views_refresh
[7] https://www.drupal.org/u/maximpodorov
[8] https://www.drupal.org/u/maximpodorov
[9] https://www.drupal.org/u/klausi
[10] https://www.drupal.org/u/dawehner
[11] https://www.drupal.org/u/mlhess
[12] https://www.drupal.org/user/690914
[13] https://www.drupal.org/user/99777
[14] https://www.drupal.org/u/pwolanin
[15] https://www.drupal.org/u/mlhess
[16] https://www.drupal.org/contact
[17] https://www.drupal.org/security-team
[18] https://www.drupal.org/writing-secure-code
[19] https://www.drupal.org/security/secure-configuration
[20] https://twitter.com/drupalsecurity
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Views refresh - Moderately Critical - Access Bypass - DRUPAL-SA-CONTRIB-2017-069, security-news, 16.08.2017
Archiv bereitgestellt durch MHonArc 2.6.19.