Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2014-126
HistoryDec 17, 2014 - 12:00 a.m.

SA-CONTRIB-2014-126 - Open Atrium - Multiple vulnerabilities

2014-12-1700:00:00
Drupal Security Team
www.drupal.org
4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.967 High

EPSS

Percentile

99.7%

This distribution enables you to create an intranet.

Several of the sub modules included do not prevent CSRF on several menu callbacks.

Open Atrium Discussion also does not exit correctly after checking access on a several ajax callbacks, allowing anyone with “access content” to update and delete nodes.

Also, (alpha) module OG Subgroups contained a vulnerability that allowed access to child groups even if membership inheritance was disabled.

The vulnerabilities are mitigated by needing the sub modules enabled – Open Atrium Sitemap, Open Atrium Discussion, and Open Atrium Admin Role and OA Teams, modules bundled with of Open Atrium Core.

CVE identifier(s) issued

  • Cross-Site Request Forgery: CVE-2014-9502 * Access Bypass (Open Atrium Discussion):CVE-2014-9503 * Access Bypass (OG Subgroups):CVE-2014-9504

Versions affected

  • Open Atrium 7.x-2.x versions prior to 7.x-2.26

Drupal core is not affected. If you do not use the contributed Open Atrium module,
there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Open Atrium Distro for Drupal 7.x, upgrade to Open Atrium 7.x-2.26

Also see the Open Atrium project page.

Reported by

Fixed by

  • Hunter Fox of the Drupal Security Team & an Open Atrium maintainer

Coordinated by

  • Hunter Fox of the Drupal Security Team & an Open Atrium maintainer

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2014-126