First published: Sat Jul 19 2014(Updated: )
The Entity API module 7.x-1.x before 7.x-1.2 for Drupal, when using the (a) Views field or (b) area plugins, allows remote attackers to read restricted entities via the (1) field, (2) header, or (3) footer of a View. NOTE: this identifier was SPLIT from CVE-2013-4273 per ADT5 due to different researcher organizations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Entity API for Drupal | <=7.x-1.1 | |
Entity API for Drupal | =7.x-1.0 | |
Entity API for Drupal | =7.x-1.0-beta1 | |
Entity API for Drupal | =7.x-1.0-beta10 | |
Entity API for Drupal | =7.x-1.0-beta11 | |
Entity API for Drupal | =7.x-1.0-beta2 | |
Entity API for Drupal | =7.x-1.0-beta3 | |
Entity API for Drupal | =7.x-1.0-beta4 | |
Entity API for Drupal | =7.x-1.0-beta5 | |
Entity API for Drupal | =7.x-1.0-beta6 | |
Entity API for Drupal | =7.x-1.0-beta7 | |
Entity API for Drupal | =7.x-1.0-beta8 | |
Entity API for Drupal | =7.x-1.0-beta9 | |
Entity API for Drupal | =7.x-1.0-rc1 | |
Entity API for Drupal | =7.x-1.0-rc2 | |
Entity API for Drupal | =7.x-1.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7391 is considered a moderate severity vulnerability, allowing unauthorized access to restricted entities.
To fix CVE-2013-7391, update the Entity API module to version 7.x-1.2 or later.
CVE-2013-7391 affects Entity API module versions 7.x-1.0 to 7.x-1.1, including various beta and release candidates.
Yes, CVE-2013-7391 can be exploited by remote attackers to access restricted entities through Views fields.
Attackers can exploit CVE-2013-7391 via fields, headers, or footers of a View to read restricted entities.