Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-147
HistorySep 09, 2015 - 12:00 a.m.

RESTful - Moderately Critical - Access bypass - SA-CONTRIB-2015-147

2015-09-0900:00:00
Drupal Security Team
www.drupal.org
4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.967 High

EPSS

Percentile

99.7%

This module enables you to expose your Drupal backend by generating a RESTful API.

The module doesnโ€™t sufficiently account for coreโ€™s page cache generation for anonymous users, when using non-cookie authentication providers. Authenticated users, via one of the authentication providers, can have their pages cached as anonymous users, and therefore allowing access to potentially restricted information during subsequent anonymous requests.

CVE identifier(s) issued

  • CVE-2015-7228

Versions affected

  • RESTful 7.x-1.x versions prior to 7.x-1.3.

Drupal core is not affected. If you do not use the contributed RESTful module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the RESTful module for Drupal 7.x, upgrade to RESTful 7.x-1.3

Also see the RESTful project page.

Reported by

Fixed by

Coordinated by

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2015-147