Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2013-067
HistoryAug 14, 2013 - 12:00 a.m.

SA-CONTRIB-2013-067 - BOTCHA - Information Disclosure (potential Privilege Escalation)

2013-08-1400:00:00
Drupal Security Team
www.drupal.org
3

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

51.7%

BOTCHA is a highly configurable non-CAPTCHA spam protection framework. The module includes a debug mode which logs the content of submitted forms including passwords and other sensitive information. An attacker who gains access to the log (i.e. dblog or syslog depending on configuration) could get access to usernames and passwords or other sensitive information. The vulnerability is mitigated by the fact that the debugging level must be set to level 5 or 6 (a high level) and the attacker must gain access to the logs (i.e. “access site reports” permission or access to syslog).

If you debug level 5 or 6 enabled on a production site, you should consider expiring passwords and instruct users to change their passwords.

CVE identifier(s) issued

  • CVE-2013-4272

Versions affected

  • BOTCHA 7.x-1.x versions prior to 7.x-1.6.
  • BOTCHA 7.x-2.x versions prior to 7.x-2.1.
  • BOTCHA 7.x-3.x versions prior to 7.x-3.3.

Drupal core is not affected. If you do not use the contributed BOTCHA module, there is nothing you need to do.

Drupal core is not affected. If you do not use the contributed BOTCHA Spam Prevention module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the 1.x branch of BOTCHA module for Drupal 7.x, upgrade to BOTCHA 7.x-1.6
  • If you use the 2.x branch of BOTCHA module for Drupal 7.x, upgrade to BOTCHA 7.x-2.1
  • If you use the 3.x branch of BOTCHA module for Drupal 7.x, upgrade to BOTCHA 7.x-3.3

Also see the BOTCHA Spam Prevention project page.

Reported by

Fixed by

Coordinated by

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

51.7%

Related for DRUPAL-SA-CONTRIB-2013-067