- Advisory ID: DRUPAL-SA-CONTRIB-2012-174
- Project: Context (third-party module)
- Version: 6.x, 7.x
- Date: 2012-12-19
- Security risk: Less critical
- Exploitable from: Remote
- Vulnerability: Information Disclosure
Description
Context has functionality that renders block content for use with its inline editor. When these requests are made the context module does not sufficiently ensure that users have access to the block. A malicious user could send a specially crafted request and get access to block content they should not be able to see.
This vulnerability is mitigated by the fact that an attacker must know the identifiers for the block containing sensitive information and that the block's code must render that sensitive information when requested by a user without privileges to see this information.
CVE identifier(s) issued
- CVE-2012-5655
Versions affected
- Context 6.x-3.x versions prior to 6.x-3.1.
- Context 7.x-3.x versions prior to 7.x-3.0-beta6.
Drupal core is not affected. If you do not use the contributed Context module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Context module for Drupal 6.x, upgrade to Context 6.x-3.1
- If you use the Context module for Drupal 7.x, upgrade to Context 7.x-3.0-beta6
Also see the Context project page.
Reported by
- Fox (hefox) of the Drupal Security Team
Fixed by
- Fox (hefox) the module maintainer
- tekante the module maintainer
Coordinated by
- Fox (hefox) of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.