Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2012-052
HistoryMar 28, 2012 - 12:00 a.m.

SA-CONTRIB-2012-052 - Node Limit Number - Cross Site Request Forgery (CSRF)

2012-03-2800:00:00
Drupal Security Team
www.drupal.org
3

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.967 High

EPSS

Percentile

99.7%

CVE: CVE-2012-2080

The Node Limit Number module enables an administrator to place limits on how many nodes may be created by each user.
Node Limit Number does not protect the delete URL against Cross Site Request Forgery attacks, allowing a malicious user to trick someone with “administer node limitnumber” permissions to unknowingly remove existing limits.

Versions affected

  • Node Limit Number 6.x-1.x versions prior to 6.x-1.2.

Drupal core is not affected. If you do not use the contributed Node Limit Number module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Node Limit Number project page.

Reported by

Fixed by

Coordinated by

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2012-052