Drupal SA-CONTRIB-2009-036: Services Module Key-Based Access Bypass

medium Nessus Plugin ID 39365

Synopsis

The remote web server contains a PHP application that is affected by an authentication bypass vulnerability.

Description

The version of Drupal running on the remote host includes the third-party Services module, which offers a way to integrate external applications with Drupal using XMLRPC, SOAP, REST, AMF, or other such interfaces. It is currently configured to use a validation token, or 'key', for authentication, and contains a flaw that allows an unauthenticated, remote attacker to view or add keys. Depending on access control checks for the underlying services exposed, an attacker may be able to access services that he would not normally be able to.

Solution

Upgrade to Services 6.x-0.14 or later.

See Also

https://www.drupal.org/node/488004

Plugin Details

Severity: Medium

ID: 39365

File Name: drupal_services_keys_bypass.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 6/11/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: cpe:/a:drupal:drupal, cpe:/a:drupal:services_module_for_drupal

Required KB Items: installed_sw/Drupal, www/PHP

Exploit Ease: No known exploits are available

Patch Publication Date: 6/10/2009

Vulnerability Publication Date: 6/10/2009

Reference Information

CVE: CVE-2009-2035

BID: 35292

SECUNIA: 33371