lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 14 Aug 2013 19:55:31 +0000 (UTC)
From: security-news@...pal.org
To: security-news@...pal.org
Subject: [Security-news] SA-CONTRIB-2013-068 - Entity API
	- Access Bypass

View online: https://drupal.org/node/2065207

  * Advisory ID: DRUPAL-SA-CONTRIB-2013-068
  * Project: Entity API [1] (third-party module)
  * Version: 7.x
  * Date: 2013-August-14
  * Security risk: Moderately critical [2]
  * Exploitable from: Remote
  * Vulnerability: Access bypass

-------- DESCRIPTION  
---------------------------------------------------------

The Entity API module extends the entity API of Drupal core in order to
provide a unified way to deal with entities and their properties.

The module doesn't sufficiently enforce node access restrictions when
checking for a user's access to view a comment associated with a particular
node. The vulnerability is mitigated by the fact that it only applies to a
user's access to view a comment in a situation where access should be
restricted with entity access.

The Entity API also does not properly restrict access when displaying
selected entities using the Views field or area plugins, allowing users to
view entities that they do not have access to. The vulnerability is mitigated
by the fact that entities are only improperly exposed when a View has been
configured to display them in a field, header or footer of a View.


-------- CVE IDENTIFIER(S) ISSUED  
--------------------------------------------

  * /A CVE identifier [3] will be requested, and added upon issuance, in
    accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED  
---------------------------------------------------

  * Entity API 7.x-1.x versions prior to 7.x-1.2

Drupal core is not affected. If you do not use the contributed Entity API [4]
module, there is nothing you need to do.

-------- SOLUTION  
------------------------------------------------------------

Install the latest version:

  * If you use the Entity API module for Drupal 7.x, upgrade to Entity API
    7.x-1.2 [5]

Also see the Entity API [6] project page.

-------- REPORTED BY  
---------------------------------------------------------

The comment access bypass was reported by:
  * tanius [7]
  * Ezra Barnett Gildesgame [8]

The Views header/footer access bypass was reported by:
  * Derek Ahmedzai [9]
  * Daniel Wehner [10]

-------- FIXED BY  
------------------------------------------------------------

  * Devin Carlson [11]
  * Jakob Perry [12]
  * Daniel Wehner [13]
  * Wolfgang Ziegler [14], the module maintainer

-------- COORDINATED BY  
------------------------------------------------------

  * Klaus Purer [15] of the Drupal Security Team
  * Greg Knaddison [16] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION  
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [17].

Learn more about the Drupal Security team and their policies [18], writing
secure code for Drupal [19], and securing your site [20].


[1] http://drupal.org/project/entity
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/entity
[5] https://drupal.org/node/2065197
[6] http://drupal.org/project/entity
[7] https://drupal.org/user/2478456
[8] https://drupal.org/user/69959
[9] https://drupal.org/user/167927
[10] https://drupal.org/user/99340
[11] https://drupal.org/user/290182
[12] https://drupal.org/user/45640
[13] https://drupal.org/user/99340
[14] https://drupal.org/user/16747
[15] http://drupal.org/user/262198
[16] http://drupal.org/user/36762
[17] http://drupal.org/contact
[18] http://drupal.org/security-team
[19] http://drupal.org/writing-secure-code
[20] http://drupal.org/security/secure-configuration

_______________________________________________
Security-news mailing list
Security-news@...pal.org
Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists