CERT-In Vulnerability Note
CIVN-2017-0179
Multiple vulnerability in Drupal modules
Original Issue Date:December 06, 2017
Severity Rating: HIGH
Software Affected
- bootstrap_carousel versions 7.x-1.x-dev
- Services single sign-on client versions 7.x-1.x-dev
- Domain Integration versions 7.x-1.x-dev
- MoneySuite versions 7.x-10.x-dev
- Cloud versions 7.x-1.x-dev
Overview
Multiple vulnerabilities have been reported in Drupal modules, which could be exploited by remote attacker to cause the denial-of-service on the targeted system.
Description
1. Cross Site Scripting vulnerability in bootstrap_carousel module
This vulnerability exists in bootstrap_carousel drupal due to the module is insufficiently handle output of img HTML tags alt property. A remote attacker could exploit this vulnerability to take permission "Carousel: Create new content" or any similar node module permissions for creating/editing/removing the module-delivered content type. Successful exploitation of this vulnerability could allow attacker to create new content on the targeted website.
2. Cross-site scripting vulnerability in Services single sign-on client Module
This vulnerability exists in Services single sign-on client due to the Module is unable to sanitize information from the request before displaying it. A remote attacker could exploit this vulnerability to gain elevated privilege of the targeted system. Successful exploitation of this vulnerability could allow attacker to gain administrative access to the targeted system.
3. Access bypass vulnerability in Domain Integration Module
This vulnerability exists in Domain Integration due to the module is unable to sufficiently check these restrictions when using one-time logins. A local attacker could exploit this vulnerability to gain elevated access to the admin of the domain. Successful exploitation of this vulnerability could allow attacker to gain administrative access to the targeted domain.
4. Access bypass vulnerability in MoneySuite Module
This vulnerability exists in MoneySuite due to access bypass vulnerability. A remote attacker could exploit this vulnerability to view payments (No data can be modified, nor are any credit card numbers displayed) made by users within the system. Successful exploitation of this vulnerability could allow attacker to view payments made by users within the system.
5. CSRF vulnerability in Cloud Module
This vulnerability exists in Cloud due to the module is unable tosufficiently protect the deletion of audit reports, thereby exposing a cross-site request vulnerability which can be exploited by unprivileged users to trick an administrator into unwanted deletion of audit reports. Successful exploitation of this vulnerability could allow attacker to have a permission to view "access audit report "of the targeted system.
Solution
Apply appropriate updates as mentioned in vendor advisories
https://www.drupal.org/sa-contrib-2017-088
https://www.drupal.org/sa-contrib-2017-087
https://www.drupal.org/sa-contrib-2017-084
https://www.drupal.org/sa-contrib-2017-085
https://www.drupal.org/sa-contrib-2017-086
Vendor Information
Drupal
https://www.drupal.org/
References
Drupal
https://www.drupal.org/sa-contrib-2017-088
https://www.drupal.org/sa-contrib-2017-087
https://www.drupal.org/sa-contrib-2017-084
https://www.drupal.org/sa-contrib-2017-085
https://www.drupal.org/sa-contrib-2017-086
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|