Voting starts in March for the Drupal Association Board election.
- Advisory ID: DRUPAL-SA-CONTRIB-2013-097
- Project: OG Features (third-party module)
- Version: 6.x
- Date: 2013-December-04
- Security risk: Not Critical
- Exploitable from: Remote
- Vulnerability: Access bypass
This module enables you to enable and disable bundles of functionality for individual Organic groups. In order to provide this functionality, this module must override all menu callbacks available in the system, in order to delegate access based on the current Organic group you are contextually in, and the settings of the features for that group.
The module doesn't sufficiently override pages that have an access callback explicitly set to FALSE, which indicates that no user (even admins) are able to access the page. Since this module does not handle that condition correctly, users will have access to those pages.
This vulnerability is mitigated by the fact that it's extremely rare that a page in Drupal has it's access callback explicitly set to FALSE because that would mean that no single user, including admins, would be able to access the page.
CVE identifier(s) issued
- OG Features 6.x-1.x versions prior to 6.x-1.3.
Drupal core is not affected. If you do not use the contributed OG Features module, there is nothing you need to do.
Install the latest version:
- If you use the OG Features module for Drupal 6.x, upgrade to OG Features 6.x-1.4
Also see the OG Features project page.
- Greg Knaddison of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact.