Advisory ID: DRUPAL-SA-CORE-2017-002
Project: Drupal core
Version: 8.x
Date: 2017-April-19
CVEID: CVE-2017-6919
Security risk: 17/25 ( Critical) AC:Basic/A:User/CI:All/II:All/E:Theoretical/TD:Default
Vulnerability: Access bypass
Description
This is a critical access bypass vulnerability. A site is only affected by this if all of the following conditions are met:
The site has the RESTful Web Services (rest) module enabled. The site allows PATCH requests. An attacker can get or register a user account on the site.While we don't normally provide security releases for unsupported minor releases, given the potential severity of this issue, we have also provided an 8.2.x release to ensure that sites that have not had a chance to update to 8.3.0 can update safely.
CVE identifier(s) issued
CVE-2017-6919Versions affected
Drupal 8 prior to 8.2.8 and 8.3.1. Drupal 7.x is not affected.Solution
If the site is running Drupal 8.2.7 or earlier, upgrade to 8.2.8. If the site is running Drupal 8.3.0, upgrade to 8.3.1.Also see the Drupal core project page.
Reported by
Samuel MortensonFixed by
Alex Pott of the Drupal Security Team xjm of the Drupal Security Team Lee Rowlands of the Drupal Security Team Wim Leers Sascha Grossenbacher Daniel Wehner Tobias Stöckler Nathaniel Catchpole of the Drupal Security TeamCoordinated by
The Drupal Security teamContact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Original author: Drupal Security Team