CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
EPSS
Percentile
99.7%
This module provides a set of APIs and tools to improve the developer experience.
Among other many other things, CTools provides an autocomplete callback for finding entities by their titles or ID.
In CTools version 1.5, additional checks were created to defend against leaking titles for entities that the user doesn’t have access to. However, certain edge cases were found to leak this private data.
This vulnerability is mitigated by the fact that you must perform the autocomplete search on custom entities that don’t include an access query tag, or you must know the ID of the entity whose title you are trying to get.
Also, CTools did not sanitize user provided URLs when processing confirmation delete pages, thereby exposing an open redirect attack vector.
This vulnerability is mitigated by the fact that a module using CTools must allow for users to insert a malicious external URL that is sent to the confirmation page.
Drupal core is not affected. If you do not use the contributed Chaos tool suite (ctools) module, there is nothing you need to do.
Install the latest version:
Also see the Chaos tool suite (ctools) project page.
twitter.com/drupalsecurity
www.drupal.org/contact
www.drupal.org/project/ctools
www.drupal.org/security-team
www.drupal.org/security-team/risk-levels
www.drupal.org/security/secure-configuration
www.drupal.org/user/1924680
www.drupal.org/user/2301194
www.drupal.org/user/266527
www.drupal.org/user/45640
www.drupal.org/writing-secure-code