First published: Wed Aug 16 2017(Updated: )
In Drupal 8 prior to 8.3.7; When using the REST API, users without the correct permission can post comments via REST that are approved even if the user does not have permission to post approved comments. This issue only affects sites that have the RESTful Web Services (rest) module enabled, the comment entity REST resource enabled, and where an attacker can access a user account on the site with permissions to post comments, or where anonymous users can post comments.
Credit: mlhess@drupal.org mlhess@drupal.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/drupal/core | >=8.0<8.1.0>=8.1.0<8.2.0>=8.2.0<8.3.0>=8.3.0<8.3.7 | |
composer/drupal/drupal | >=8.0<8.1.0>=8.1.0<8.2.0>=8.2.0<8.3.0>=8.3.0<8.3.7 | |
Drupal Drupal | >=8.0.0<8.3.7 | |
composer/drupal/drupal | >=8.0<8.3.7 | 8.3.7 |
composer/drupal/core | >=8.0<8.3.7 | 8.3.7 |
>=8.0.0<8.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6924 has been classified as a moderate severity vulnerability.
The vulnerability can be fixed by upgrading to Drupal version 8.3.7 or later.
CVE-2017-6924 affects Drupal versions prior to 8.3.7.
The vulnerability specifically affects the REST API in Drupal when the RESTful Web Services module is enabled.
Yes, users without the correct permissions can post approved comments via the REST API due to this vulnerability.