exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Drupal Monster Menus 6.x / 7.x Access Bypass

Drupal Monster Menus 6.x / 7.x Access Bypass
Posted Aug 8, 2013
Site drupal.org

Drupal Monster Menus third party module versions 6.x and 7.x suffer from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 7fb2c6eae9f60e15363d5c38f33457952348d27b086229fe30b748cd0f032469

Drupal Monster Menus 6.x / 7.x Access Bypass

Change Mirror Download
View online: https://drupal.org/node/2059823

* Advisory ID: DRUPAL-SA-CONTRIB-2013-066
* Project: Monster Menus [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2013-August-07
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass

-------- DESCRIPTION
---------------------------------------------------------

Monster Menus enables you to create granular page permissions, and apply them
to a hierarchical page structure. The mm_webform submodule enables you to
assign permissions derived from Monster Menus to webform forms.

The module doesn't sufficiently filter titles entered into page settings and
echoes the supplied title back to the next user editing the settings, thereby
allowing a Cross Site Scripting attack (XSS). This vulnerability is mitigated
by the fact that an attacker must have the ability to add pages to the
Monster Menus tree, and must also entice another user to edit the settings of
a maliciously-crafted page. The mm_webform submodule doesn't correctly
prohibit users with only "Who can read data submitted to this webform"
permission from deleting webform submissions leading to an Access Bypass.
This vulnerability is mitigated by the fact that an attacker must have an
active login which is permitted to read a webform's submissions.

-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

* Monster Menus 6.x-6.x versions prior to 6.x-6.61.
* Monster Menus 7.x-1.x versions prior to 7.x-1.13.

Drupal core is not affected. If you do not use the contributed Monster Menus
[4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

* If you use the Monster Menus module for Drupal 6.x, upgrade to Monster
Menus 6.x-6.61 [5]
* If you use the Monster Menus module for Drupal 7.x, upgrade to Monster
Menus 7.x-1.13 [6]

Also see the Monster Menus [7] project page.

-------- REPORTED BY
---------------------------------------------------------

* Five Colleges, Inc.

-------- FIXED BY
------------------------------------------------------------

* Dan Wilga [8] the module maintainer

-------- COORDINATED BY
------------------------------------------------------

* Greg Knaddison [9] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [10].

Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].


[1] http://drupal.org/project/monster_menus
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/monster_menus
[5] https://drupal.org/node/2059807
[6] https://drupal.org/node/2059805
[7] http://drupal.org/project/monster_menus
[8] http://drupal.org/user/56892
[9] http://drupal.org/user/36762
[10] http://drupal.org/contact
[11] http://drupal.org/security-team
[12] http://drupal.org/writing-secure-code
[13] http://drupal.org/security/secure-configuration

Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close