- Advisory ID: DRUPAL-SA-CONTRIB-2015-004
- Project: Context (third-party module)
- Version: 7.x
- Date: 2015-January-07
- Security risk: 9/25 ( Less Critical) AC:Basic/A:None/CI:None/II:None/E:Theoretical/TD:Default
- Vulnerability: Open Redirect
Description
Context allows you to manage contextual conditions and reactions for different portions of your site.
Context UI module wasn’t checking for external URLs in the HTTP GET destination parameter when redirecting users that are activating/deactivating the Context UI inline editor dialog, thereby leading to an Open Redirect vulnerability.
This vulnerability is mitigated by the fact that the victim must have the permission “administer contexts” and that Context UI module must be enabled.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance
with Drupal Security Team processes.
Versions affected
- Context 7.x-3.x versions prior to 7.x-3.6
Drupal core is not affected. If you do not use the contributed Context module,
there is nothing you need to do.
Solution
Install the latest version:
- If you use the Context module for Drupal 7, upgrade to Context 7.x-3.6
Also see the Context project page.
Reported by
- Pere Orga provisional member of the Drupal Security Team
Fixed by
- Pere Orga provisional member of the Drupal Security Team
- Chris Johnson, module maintainer
- Yonas Yanfa, module maintainer
Coordinated by
- Owen Barton of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity