Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2013-003
HistoryJan 16, 2013 - 12:00 a.m.

SA-CONTRIB-2013-003 - RESTful Web Services - Cross site request forgery (CSRF)

2013-01-1600:00:00
Drupal Security Team
www.drupal.org
4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

46.9%

This module enables you to expose Drupal entities as RESTful web services. It provides a machine-readable interface to exchange resources in JSON, XML and RDF.

The module doesn’t sufficiently verify POST requests thereby exposing a Cross Site Request Forgery vulnerability.

This vulnerability is mitigated by the fact that an attacker must trick an authenticated user onto a prepared page that leverages a weakness in certain browser plugins.

CVE identifier(s) issued

  • CVE-2013-0205

Versions affected

  • RESTWS 7.x-1.x versions prior to 7.x-1.2.
  • RESTWS 7.x-2.x versions prior to 7.x-2.0-alpha4.

Drupal core is not affected. If you do not use the contributed RESTful Web Services module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the RESTWS 1.x module for Drupal 7.x, upgrade to RESTWS 7.x-1.2
  • If you use the RESTWS 2.x module for Drupal 7.x, upgrade to RESTWS 7.x-2.0-alpha4

Also see the RESTful Web Services project page.

Reported by

Fixed by

Coordinated by

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

46.9%

Related for DRUPAL-SA-CONTRIB-2013-003