First published: Mon Dec 03 2012(Updated: )
The User Read-Only module 6.x-1.x before 6.x-1.4 and 7.x-1.x before 7.x-1.4 for Drupal, does not properly assign roles when there are more than three roles on the site and certain unspecified configurations, which might allow remote authenticated users to gain privileges by performing certain operations, as demonstrated by changing a password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
User Read-only Project User Readonly | =6.x-1.0 | |
User Read-only Project User Readonly | =6.x-1.1 | |
User Read-only Project User Readonly | =6.x-1.2 | |
User Read-only Project User Readonly | =6.x-1.3 | |
User Read-only Project User Readonly | =6.x-1.x-dev | |
User Read-only Project User Readonly | =7.x-1.0 | |
User Read-only Project User Readonly | =7.x-1.1 | |
User Read-only Project User Readonly | =7.x-1.2 | |
User Read-only Project User Readonly | =7.x-1.3 | |
User Read-only Project User Readonly | =7.x-1.x-dev | |
Drupal Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5557 has been classified as a moderate severity vulnerability due to its potential to allow privilege escalation.
To fix CVE-2012-5557, update the User Read-Only module to version 6.x-1.4 or 7.x-1.4 or later.
CVE-2012-5557 affects installations of the User Read-Only module versions 6.x-1.0 through 6.x-1.3 and 7.x-1.0 through 7.x-1.3.
CVE-2012-5557 is exploitable in sites with more than three roles and specific administrative configurations that are not fully specified.
The potential impacts of CVE-2012-5557 include unauthorized privilege escalation for remote authenticated users.