Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-025
HistoryJan 21, 2015 - 12:00 a.m.

SA-CONTRIB-2015-025 - Patterns - Cross Site Request Forgery (CSRF)

2015-01-2100:00:00
Drupal Security Team
www.drupal.org
3

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.967 High

EPSS

Percentile

99.7%

Patterns module manages and automates site configuration. Site configurations stored in XML or YAML are called Patterns, and these are easy to read, modify, manage & share and can be executed manually or as a part of an automated web site deployment.

Some links were not protected against CSRF. A malicious user could cause an administrator to restore, publish and unpublish patterns by getting the administrator’s browser to make a request to a specially-crafted URL.

CVE identifier(s) issued

  • CVE-2015-3367

Versions affected

  • Patterns 7.x-2.x versions prior to 7.x-2.2.

Drupal core is not affected. If you do not use the contributed Patterns module,
there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Patterns module for Drupal 7.x, upgrade to Patterns 7.x-2.2

Also see the Patterns project page.

Reported by

  • Pere Orga provisional member of the Drupal Security Team

Fixed by

Coordinated by

  • Pere Orga provisional member of the Drupal Security Team

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2015-025