Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

[Security-news] SA-CONTRIB-2013-081 - Spaces - Access bypass
From: security-news () drupal org
Date: Wed, 23 Oct 2013 18:12:44 +0000 (UTC)

View online: https://drupal.org/node/2118717

  * Advisory ID: DRUPAL-SA-CONTRIB-2013-081
  * Project: Spaces [1] (third-party module)
  * Version: 6.x
  * Date: 2013-10-23
  * Security risk: Less critical [2]
  * Exploitable from: Remote
  * Vulnerability: Access bypass

-------- DESCRIPTION  
---------------------------------------------------------

This module enables you to make configuration options generally available
only at the sitewide level to be configurable and overridden by individual
"spaces" on a Drupal site.

The spaces submodule, Spaces OG, doesn't properly handle deleting of organic
group group spaces when the option to move to a new group is selected.
Instead of moving the content to a new group, the content is left orphaned,
and for deleted private groups, that content will then be viewable by anyone
with "access content" permission when the site's or content's access is
rebuilt.

The issue is mitigated by needing to be using the submodule spaces OG, and
needing the site users to be in the situation of deleting a group and using
that move option, and needing the content's access to be rebuilt.


-------- CVE IDENTIFIER(S) ISSUED  
--------------------------------------------

  * /A CVE identifier [3] will be requested, and added upon issuance, in
    accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED  
---------------------------------------------------

  * Spaces 6.x-3.x versions prior to 6.x-3.7.

Drupal core is not affected. If you do not use the contributed Spaces [4]
module, there is nothing you need to do.

-------- SOLUTION  
------------------------------------------------------------

Install the latest version:

  * If you use the Spaces module for Drupal 6.x, upgrade to Spaces 6.x-3.7 [5]

Also see the Spaces [6] project page.

-------- REPORTED BY  
---------------------------------------------------------

  * Hunter Fox [7] of the Drupal Security Team

-------- FIXED BY  
------------------------------------------------------------

  * Tobby Hagler [8] a module maintainer
  * Hunter Fox [9] of the Drupal Security Team, module maintainer.

-------- COORDINATED BY  
------------------------------------------------------

  * Hunter Fox [10] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION  
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [11].

Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].


[1] http://drupal.org/project/spaces
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/spaces
[5] https://drupal.org/node/2118745
[6] http://drupal.org/project/spaces
[7] http://drupal.org/user/426416
[8] http://drupal.org/user/154797
[9] http://drupal.org/user/426416
[10] http://drupal.org/user/426416
[11] http://drupal.org/contact
[12] http://drupal.org/security-team
[13] http://drupal.org/writing-secure-code
[14] http://drupal.org/security/secure-configuration

_______________________________________________
Security-news mailing list
Security-news () drupal org
Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • [Security-news] SA-CONTRIB-2013-081 - Spaces - Access bypass security-news (Oct 23)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]