Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2014-075
HistoryAug 06, 2014 - 12:00 a.m.

SA-CONTRIB-2014-075 - Biblio Autocomplete - SQL injection and Access Bypass

2014-08-0600:00:00
Drupal Security Team
www.drupal.org
3

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.007

Percentile

81.2%

This module provides functionality for AJAX based auto-completion of fields in the Biblio node type (provided by the Biblio module) using previously entered values and third party services.

The submodule “Biblio self autocomplete” for previously entered values doesn’t sufficiently sanitize user input as it is used in a database query.

Additionally, the AJAX autocompletion callback itself was not properly secured, thus potentially allowing any visitor access to the data, including the anonymous user.

CVE identifier(s) issued

Versions affected

Drupal core is not affected. If you do not use the contributed Biblio Autocomplete module,
there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Biblio Autocomplete module for Drupal 6.x, upgrade to Biblio Autocomplete 6.x-1.1.
  • If you use the Biblio Autocomplete module for Drupal 7.x, upgrade to Biblio Autocomplete 7.x-1.5.

Additionally there is a new permission “access biblio autocomplete” for accessing the search. You need to give this permission to users with write permissions on Biblio nodes.

Also see the Biblio Autocomplete project page.

Reported by

Fixed by

Coordinated by

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.007

Percentile

81.2%

Related for DRUPAL-SA-CONTRIB-2014-075