Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2013-042
HistoryApr 10, 2013 - 12:00 a.m.

SA-CONTRIB-2013-042 - RESTful Web Services (RESTWS) - Denial of Service

2013-04-1000:00:00
Drupal Security Team
www.drupal.org
4

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.967 High

EPSS

Percentile

99.7%

This module enables you to expose Drupal entities as RESTful web services. It provides a machine-readable interface to exchange resources in JSON, XML and RDF.

The module interferes with Drupal’s page cache and allows an attacker to poison the cache with non-HTML page responses, thereby exposing a denial of service vulnerability.

This vulnerability is mitigated by the fact that page caching must be enabled and the anonymous user role must be assigned a RESTWS permission, for example β€œaccess resource node”.

CVE identifier(s) issued

  • CVE-2013-1946

Versions affected

  • RESTWS 7.x-1.x versions prior to 7.x-1.3.
  • RESTWS 7.x-2.x versions prior to 7.x-2.0-alpha5.

Drupal core is not affected. If you do not use the contributed RESTful Web Services module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the RESTWS 1.x module for Drupal 7.x, upgrade to RESTWS 7.x-1.3
  • If you use the RESTWS 2.x module for Drupal 7.x, upgrade to RESTWS 7.x-2.0-alpha5

Also see the RESTful Web Services project page.

Reported by

Fixed by

Coordinated by

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2013-042