Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2013-062
HistoryAug 07, 2013 - 12:00 a.m.

SA-CONTRIB-2013-062 - RESTful Web Services (RESTWS) - Access Bypass

2013-08-0700:00:00
Drupal Security Team
www.drupal.org
4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.967 High

EPSS

Percentile

99.7%

This module enables you to expose Drupal entities as RESTful web services. It provides a machine-readable interface to exchange resources in JSON, XML and RDF.

The module doesn’t sufficiently check for field level access when preforming entity write operations on POST and PUT requests. It also does not check the allowed filter formats for a user for formatted text fields, thereby allowing an attacker to exploit XSS with a format that displays full HTML or even PHP code execution with a PHP code format.

This vulnerability is mitigated by the fact that an attacker must have a role with a RESTWS permission such as “access resource node” and a permission to write entities such as “create page content”. PHP code execution is only possible if the PHP module is enabled.

CVE identifier(s) issued

  • CVE-2013-4225

Versions affected

  • RESTWS 7.x-1.x versions prior to 7.x-1.4.
  • RESTWS 7.x-2.x versions prior to 7.x-2.1.

Drupal core is not affected. If you do not use the contributed module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the RESTWS 1.x module for Drupal 7.x, upgrade to RESTWS 7.x-1.4
  • If you use the RESTWS 2.x module for Drupal 7.x, upgrade to RESTWS 7.x-2.1

Also see the RESTful Web Services project page.

Reported by

Fixed by

Coordinated by

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2013-062