Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-057
HistoryFeb 25, 2015 - 12:00 a.m.

SA-CONTRIB-2015-057 - Spider Contacts - Multiple vulnerabilities - Unsupported

2015-02-2500:00:00
Drupal Security Team
www.drupal.org
7

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

53.6%

Spider Contacts module provides a user-friendly way to manage and display contacts.

The module doesn’t use Drupal’s Database API properly, not sanitizing user input on SQL queries and thereby exposing a SQL Injection vulnerability. This vulnerability is mitigated by the fact that the attacker must have a role with the permission “access Spider Contacts category administration”.

Additionally, the module doesn’t sufficiently protect some URLs against CSRF. A malicious user could trick an administrator into deleting contact categories by getting their browser to make a request to a specially-crafted URL.

CVE identifier(s) issued

  • SQL Injection: CVE-2015-4348 * Cross Site Request Forgery:CVE-2015-4349

Versions affected

All versions of Spider Contacts module.

Drupal core is not affected. If you do not use the contributed Spider Contacts module, there is nothing you need to do.

Solution

If you use the Spider Contacts module you should uninstall it.

Also see the Spider Contacts project page.

Reported by

Fixed by

Not applicable.

Coordinated by

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

53.6%

Related for DRUPAL-SA-CONTRIB-2015-057