Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2012-162
HistoryNov 14, 2012 - 12:00 a.m.

SA-CONTRIB-2012-162 - RESTful Web Services - Cross site request forgery (CSRF)

2012-11-1400:00:00
Drupal Security Team
www.drupal.org
6

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

47.1%

This module enables you to expose Drupal entities as RESTful web services. It provides a machine-readable interface to exchange resources in JSON, XML and RDF.

The module doesn’t sufficiently verify POST requests thereby exposing a Cross Site Request Forgery vulnerability.

This vulnerability is mitigated by the fact that an attacker must trick an authenticated user onto a page with a site-specific malicious HTML form submission.

CVE: CVE-2012-5556

Versions affected

  • RESTWS 7.x-1.x versions prior to 7.x-1.1.
  • RESTWS 7.x-2.x versions prior to 7.x-2.0-alpha3.

Drupal core is not affected. If you do not use the contributed RESTful Web Services module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the RESTWS 1.x module for Drupal 7.x, upgrade to RESTWS 7.x-1.1
  • If you use the RESTWS 2.x module for Drupal 7.x, upgrade to RESTWS 7.x-2.0-alpha3

Also see the RESTful Web Services project page.

Reported by

Fixed by

Coordinated by

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

47.1%

Related for DRUPAL-SA-CONTRIB-2012-162