Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-011
HistoryJan 07, 2015 - 12:00 a.m.

SA-CONTRIB-2015-011 - Todo Filter - Cross Site Request Forgery (CSRF)

2015-01-0700:00:00
Drupal Security Team
www.drupal.org
4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

59.7%

Todo Filter module provides an input filter to display check-boxes that can be used as a task list.

Some paths were not protected against CSRF, meaning that an attacker could cause users to toggle tasks they did not intend to toggle by getting the user’s browser to make a request to a specially-crafted URL while the user was logged in.

CVE identifier(s) issued

  • CVE-2015-3350

Versions affected

  • Todo Filter 6.x-1.x versions prior to 6.x-1.1.
  • Todo Filter 7.x-1.x versions prior to 7.x-1.1.

Drupal core is not affected. If you do not use the contributed Todo Filter module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Todo Filter project page.

Reported by

  • Pere Orga provisional member of the Drupal Security Team

Fixed by

Coordinated by

  • Pere Orga provisional member of the Drupal Security Team

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

59.7%

Related for DRUPAL-SA-CONTRIB-2015-011