Access bypass in Drupal - CVE-2011-2726
Published: September 15, 2016
Vulnerability identifier: #VU477
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2011-2726
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Drupal
Affected software:
Drupal
Drupal
Detailed vulnerability description
The vulnerability allows a remote user to get access to private file fields on comments.
The weakness exists due to access control error. Drupal 7 has 2 new features: attaching File upload fields to any entity type, individual File upload fields - to the private file directory. A non-privileged user can download file attached to the comment, if he guessed or learnt a direct URL and if these featurs are using on comments.
Successfull exploitation of the vulnerability allows non-privileged users to access private file fields.
The weakness exists due to access control error. Drupal 7 has 2 new features: attaching File upload fields to any entity type, individual File upload fields - to the private file directory. A non-privileged user can download file attached to the comment, if he guessed or learnt a direct URL and if these featurs are using on comments.
Successfull exploitation of the vulnerability allows non-privileged users to access private file fields.
How to mitigate CVE-2011-2726
Update 7.x to 7.5 or 7.7.