- Advisory ID: DRUPAL-SA-CONTRIB-2015-163
- Project: Monster Menus (third-party module)
- Version: 7.x
- Date: 2015-November-04
- Security risk: 12/25 ( Moderately Critical) AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:Default
- Vulnerability: Access bypass
Description
Monster Menus is a hierarchical menu tree, which provides highly scalable, granular permissions for all pages within a site.
The module includes an option to remove nodes from view (add them to a “recycle bin”) rather than deleting them outright. When a node has been put into a bin using an affected version of the module, it remains visible via a seldom-used URL pattern to the users to whom it had been visible previously, when it was outside of the recycle bin.
This vulnerability is mitigated by the facts that:
- Sites which do not use the recycle bin feature are not vulnerable.
- The exposed node is no more accessible than it had been before being placed into the recycle bin. If the node could not be read by a particular user while it was on the regular page, it would still be unreadable by that user when in the recycle bin.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Monster Menus versions 7.x-1.21 through 7.x-1.23.
Drupal core is not affected. If you do not use the contributed Monster Menus module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Monster Menus module for Drupal 7.x, upgrade to Monster Menus 7.x-1.24.
Also see the Monster Menus project page.
Reported by
Fixed by
- Dan Wilga the module maintainer
Coordinated by
- Greg Knaddison of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity