Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2012-152
HistoryOct 10, 2012 - 12:00 a.m.

SA-CONTRIB-2012-152 - Feeds - Access bypass

2012-10-1000:00:00
Drupal Security Team
www.drupal.org
5

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

55.2%

The feeds module enables you to import or aggregate data as nodes, users, taxonomy terms or simple database records.
The module doesn’t sufficiently check permissions when creating nodes on behalf of a user.
This vulnerability is mitigated by the fact that an attacker must have control over the source feed, and the Feeds importer must have a field from that feed mapped to the node’s author.

Note: the Feeds module doesn’t have a stable release and therefore a Security Advisory would not normally be issued, per the Drupal Security Team policy. However, this issue affects the Mailhandler module, which does have a stable release. For modules with dependencies, maintainers are encouraged to create stable releases only for those modules dependent on stable releases.

CVE: CVE-2012-5543

Versions affected

  • Feeds 7.x-2.x versions prior to 7.x-2.0-alpha6.

Drupal core is not affected. If you do not use the contributed Feeds module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Feeds module for Drupal 7.x, upgrade to Feeds 7.x-2.0-alpha6.

Also see the Feeds project page.

Reported by

Fixed by

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

55.2%

Related for DRUPAL-SA-CONTRIB-2012-152