Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2012-017
HistoryFeb 08, 2012 - 12:00 a.m.

SA-CONTRIB-2012-017 - Finder - Multiple vulnerabilities

2012-02-0800:00:00
Drupal Security Team
www.drupal.org
5

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.8%

CVE: CVE-2012-1641

Finder is a Drupal module that allows users to create faceted search forms. The module’s autocomplete, checkbox, and radio button functionalities previously did not sanitize the output of fields and raw database values.

In addition, users with the “administer finder” permission were able to execute arbitrary code through a PHP import interface; specific PHP execution permissions were not required.Updated: This issue affected only the 7.x branch of code. The 6.x branch used the permission “administer finder PHP settings” which is sufficiently clear that it allows execution of PHP code.

Versions affected

  • Finder 6.x-1.x prior to 6.x-1.26
  • Finder 7.x-1.x versions (all)
  • Finder 7.x-2.x versions prior to 7.x-2.0-alpha8

Drupal core is not affected. If you do not use the contributed Finder module, there is nothing you need to do.

Solution

Install the latest version:

See also the Finder project page.

Reported by

Fixed by

Coordinated by

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.8%

Related for DRUPAL-SA-CONTRIB-2012-017