Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-163
HistoryNov 04, 2015 - 12:00 a.m.

Monster Menus - Access Bypass - Moderately Critical - SA-CONTRIB-2015-163

2015-11-0400:00:00
Drupal Security Team
www.drupal.org
3

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

58.6%

Monster Menus is a hierarchical menu tree, which provides highly scalable, granular permissions for all pages within a site.

The module includes an option to remove nodes from view (add them to a “recycle bin”) rather than deleting them outright. When a node has been put into a bin using an affected version of the module, it remains visible via a seldom-used URL pattern to the users to whom it had been visible previously, when it was outside of the recycle bin.

This vulnerability is mitigated by the facts that:

  1. Sites which do not use the recycle bin feature are not vulnerable.
  2. The exposed node is no more accessible than it had been before being placed into the recycle bin. If the node could not be read by a particular user while it was on the regular page, it would still be unreadable by that user when in the recycle bin.

CVE identifier(s) issued

  • CVE-2015-8095

Versions affected

  • Monster Menus versions 7.x-1.21 through 7.x-1.23.

Drupal core is not affected. If you do not use the contributed Monster Menus module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Monster Menus module for Drupal 7.x, upgrade to Monster Menus 7.x-1.24.

Also see the Monster Menus project page.

Reported by

Fixed by

Coordinated by

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

58.6%

Related for DRUPAL-SA-CONTRIB-2015-163