[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20130403192424.9D8E0108052@www2.drupal.org>
Date: Wed, 3 Apr 2013 19:24:24 +0000 (UTC)
From: security-news@...pal.org
To: security-news@...pal.org
Subject: [Security-news] SA-CONTRIB-2013-041 - Chaos tool
suite (ctools) - Access bypass
View online: http://drupal.org/node/1960406
* Advisory ID: DRUPAL-SA-CONTRIB-2013-041
* Project: Chaos tool suite (ctools) [1] (third-party module)
* Version: 7.x
* Date: 2013-April-03
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
This CTools module provides a set of APIs and tools to improve the developer
experience.
The module doesn't sufficiently enforce node access when providing an
autocomplete list of suggested node titles, allowing users with the "access
content" permission to see the titles of nodes which they should not be able
to view.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Chaos tool suite (ctools) 7.x-1.x versions prior to 7.x-1.3.
Drupal core is not affected. If you do not use the contributed Chaos tool
suite (ctools) [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Ctools module for Drupal 7.x, upgrade to Ctools 7.x-1.3 [5]
Also see the Chaos tool suite (ctools) [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Greg Knaddison [7] of the Drupal Security Team
* Cash Williams [8]
-------- FIXED BY
------------------------------------------------------------
* Daniel Wehner [9] the module maintainer.
* Cash Williams [10]
* Lee Rowlands [11] of the Drupal Security Team
-------- COORDINATED BY
------------------------------------------------------
* Lee Rowlands [12] of the Drupal Security Team
* Greg Knaddison [13] of the Drupal Security Team
* Ben Jeavons [14] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [15].
Learn more about the Drupal Security team and their policies [16], writing
secure code for Drupal [17], and securing your site [18].
[1] http://drupal.org/project/ctools
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/ctools
[5] http://drupal.org/node/1960424
[6] http://drupal.org/project/ctools
[7] http://drupal.org/user/36762
[8] http://drupal.org/user/421070
[9] http://drupal.org/user/99340
[10] http://drupal.org/user/421070
[11] http://drupal.org/user/395439
[12] http://drupal.org/user/395439
[13] http://drupal.org/user/36762
[14] http://drupal.org/user/91990
[15] http://drupal.org/contact
[16] http://drupal.org/security-team
[17] http://drupal.org/writing-secure-code
[18] http://drupal.org/security/secure-configuration
_______________________________________________
Security-news mailing list
Security-news@...pal.org
Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists