View online: https://drupal.org/node/2149791 * Advisory ID: DRUPAL-SA-CONTRIB-2013-097 * Project: OG Features [1] (third-party module) * Version: 6.x * Date: 2013-December-04 * Security risk: Not Critical [2] * Exploitable from: Remote * Vulnerability: Access bypass -------- DESCRIPTION --------------------------------------------------------- This module enables you to enable and disable bundles of functionality for individual Organic groups [3]. In order to provide this functionality, this module must override all menu callbacks available in the system, in order to delegate access based on the current Organic group you are contextually in, and the settings of the features for that group. The module doesn't sufficiently override pages that have an access callback explicitly set to FALSE, which indicates that no user (even admins) are able to access the page. Since this module does not handle that condition correctly, users will have access to those pages. This vulnerability is mitigated by the fact that it's extremely rare that a page in Drupal has it's access callback explicitly set to FALSE because that would mean that no single user, including admins, would be able to access the page. -------- CVE IDENTIFIER(S) ISSUED -------------------------------------------- * /A CVE identifier [4] will be requested, and added upon issuance, in accordance with Drupal Security Team processes./ -------- VERSIONS AFFECTED --------------------------------------------------- * OG Features 6.x-1.x versions prior to 6.x-1.3. Drupal core is not affected. If you do not use the contributed OG Features [5] module, there is nothing you need to do. -------- SOLUTION ------------------------------------------------------------ Install the latest version: * If you use the OG Features module for Drupal 6.x, upgrade to OG Features 6.x-1.4 [6] Also see the OG Features [7] project page. -------- REPORTED BY --------------------------------------------------------- * Andrey Tretyakov [8] -------- FIXED BY ------------------------------------------------------------ * Mike Stefanello [9] the module maintainer * Jess Straatmann [10] -------- COORDINATED BY ------------------------------------------------------ * Greg Knaddison [11] of the Drupal Security Team -------- CONTACT AND MORE INFORMATION ---------------------------------------- The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [12]. Learn more about the Drupal Security team and their policies [13], writing secure code for Drupal [14], and securing your site [15]. [1] http://drupal.org/project/og_features [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/project/og [4] http://cve.mitre.org/ [5] http://drupal.org/project/og_features [6] https://drupal.org/node/2149743 [7] http://drupal.org/project/og_features [8] https://drupal.org/user/169459 [9] https://drupal.org/user/107190 [10] https://drupal.org/user/105111 [11] https://drupal.org/user/36762 [12] http://drupal.org/contact [13] http://drupal.org/security-team [14] http://drupal.org/writing-secure-code [15] http://drupal.org/security/secure-configuration _______________________________________________ Security-news mailing list Security-news@drupal.org Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news