First published: Mon Dec 03 2012(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the Search API module 7.x-1.x before 7.x-1.3 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable a server via a server action or (2) enable a search index via an enable index action.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thomas Seidl Search Api | =7.x-1.0 | |
Thomas Seidl Search Api | =7.x-1.0-beta1 | |
Thomas Seidl Search Api | =7.x-1.0-beta10 | |
Thomas Seidl Search Api | =7.x-1.0-beta2 | |
Thomas Seidl Search Api | =7.x-1.0-beta3 | |
Thomas Seidl Search Api | =7.x-1.0-beta4 | |
Thomas Seidl Search Api | =7.x-1.0-beta5 | |
Thomas Seidl Search Api | =7.x-1.0-beta6 | |
Thomas Seidl Search Api | =7.x-1.0-beta7 | |
Thomas Seidl Search Api | =7.x-1.0-beta8 | |
Thomas Seidl Search Api | =7.x-1.0-beta9 | |
Thomas Seidl Search Api | =7.x-1.0-rc1 | |
Thomas Seidl Search Api | =7.x-1.1 | |
Thomas Seidl Search Api | =7.x-1.2 | |
Thomas Seidl Search Api | =7.x-1.x-dev | |
Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5547 has been classified with a high severity level due to its ability to allow remote attackers to hijack the authentication of administrators.
To fix CVE-2012-5547, you should update the Search API module to version 7.x-1.3 or later.
The potential impacts of CVE-2012-5547 include unauthorized actions taken by attackers on behalf of administrators, such as enabling servers or search indices.
CVE-2012-5547 affects versions prior to 7.x-1.3, including all 7.x-1.0 beta releases and 7.x-1.1 and 7.x-1.2.
Yes, CVE-2012-5547 is specifically identified as multiple cross-site request forgery (CSRF) vulnerabilities.