First published: Mon Dec 03 2012(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the RESTful Web Services (RESTWS) module 7.x-1.x before 7.x-1.1 and 7.x-2.x before 7.x-2.0-alpha3 for Drupal allow remote attackers to hijack the authentication of arbitrary users via unknown vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Restful Web Services | =7.x-1.0 | |
Restful Web Services | =7.x-1.0-beta1 | |
Restful Web Services | =7.x-1.0-beta2 | |
Restful Web Services | =7.x-1.x-dev | |
Restful Web Services | =7.x-2.0-alpha1 | |
Restful Web Services | =7.x-2.0-alpha2 | |
Restful Web Services | =7.x-2.x-dev | |
Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5556 is rated as a critical vulnerability due to its potential to allow remote attackers to hijack user authentication.
To fix CVE-2012-5556, you should update the Restful Web Services module to version 7.x-1.1 or later for 7.x-1.x, and 7.x-2.0-alpha3 or later for 7.x-2.x.
The potential impacts of CVE-2012-5556 include unauthorized access and actions on behalf of authenticated users due to CSRF vulnerabilities.
Versions 7.x-1.0, 7.x-1.0-beta1, 7.x-1.0-beta2, 7.x-1.x-dev, 7.x-2.0-alpha1, 7.x-2.0-alpha2, and 7.x-2.x-dev are affected by CVE-2012-5556.
Any user of Drupal installations with the affected versions of the Restful Web Services module can be impacted by CVE-2012-5556.