First published: Tue Feb 11 2020(Updated: )
The RESTful Web Services (restws) module 7.x-1.x before 7.x-1.4 and 7.x-2.x before 7.x-2.1 for Drupal does not properly restrict access to entity write operations, which makes it easier for remote authenticated users with the "access resource node" and "create page content" permissions (or equivalents) to conduct cross-site scripting (XSS) or execute arbitrary PHP code via a crafted text field.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Restful Web Services | >=7.x-1.0<7.x-1.4 | |
Restful Web Services | >=7.x-2.0<7.x-2.1 | |
Restful Web Services | =7.x-2.x-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4225 has a medium severity rating due to improper access restrictions allowing unauthorized entity write operations.
To fix CVE-2013-4225, update the RESTful Web Services module to version 7.x-1.4 or 7.x-2.1 or later.
CVE-2013-4225 affects Drupal instances using versions of the RESTful Web Services module prior to 7.x-1.4 and 7.x-2.1.
CVE-2013-4225 concerns users with 'access resource node' and 'create page content' permissions that can exploit the vulnerability.
Exploitation of CVE-2013-4225 allows remote authenticated users to perform unauthorized entity write operations.