- Advisory ID: DRUPAL-SA-CONTRIB-2015-168
- Project: Mollom (third-party module)
- Version: 6.x
- Date: 2015-December-02
- Security risk: 16/25 ( Critical) AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:All
- Vulnerability: Access bypass
Description
The Mollom module allows users to protect their website from spam. As part of the spam protection, Mollom enables the website administrator to create a blacklist. When content is submitted that matches terms on the black list it will be automatically marked as spam and rejected per the site configuration.
The module doesn’t sufficiently check for access when accessing or modifying the blacklist for the site. This enables a potential attacker to add, update, or remove their own terms to a site-wide blacklist. The potential exists for an attacker to remove existing blacklist terms which could allow their content to be accepted onto the site.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Mollom 6.x-2.x versions between 6.x-2.7 through 6.x-2.14.
This does not affect the modules for Drupal 7 or Drupal 8.
Drupal core is not affected. If you do not use the contributed Mollom module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Mollom module for Drupal 6.x, upgrade to Mollom 6.x-2.15
Also see the Mollom project page.
Reported by
- Nick Veenhof, module maintainer
Fixed by
- Nick Veenhof, module maintainer
Coordinated by
- Pere Orga of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity