First published: Tue Feb 18 2020(Updated: )
The Authenticated User Page Caching (Authcache) module 7.x-1.x before 7.x-1.5 for Drupal does not properly restrict access to cached pages, which allows remote attackers with the same role-combination as the superuser to obtain sensitive information via the cached pages of the superuser.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Authenticated User Page Caching | =7.x-1.0 | |
Drupal Authenticated User Page Caching | =7.x-1.1 | |
Drupal Authenticated User Page Caching | =7.x-1.2 | |
Drupal Authenticated User Page Caching | =7.x-1.3 | |
Drupal Authenticated User Page Caching | =7.x-1.4 | |
Drupal Authenticated User Page Caching | =7.x-1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4226 is a vulnerability in the Authenticated User Page Caching (Authcache) module for Drupal before version 7.x-1.5.
CVE-2013-4226 has a severity rating of 6.5, which is considered medium.
CVE-2013-4226 allows remote attackers with the same role-combination as the superuser to obtain sensitive information via the cached pages of the superuser.
To fix CVE-2013-4226, upgrade to version 7.x-1.5 or later of the Authenticated User Page Caching (Authcache) module for Drupal.
More information about CVE-2013-4226 can be found at the following references: [Link 1](http://www.openwall.com/lists/oss-security/2013/08/10/1), [Link 2](https://drupal.org/node/2058165), [Link 3](https://drupal.org/node/2059589).