CVE-2024-13241

9.1 CRITICAL

📋 TL;DR

This CVE describes an Improper Authorization vulnerability in Drupal Open Social that allows attackers to collect data from common resource locations without proper permissions. It affects all Open Social installations from initial versions before 12.0.5. Attackers can potentially access sensitive information that should be restricted.

💻 Affected Systems

Products:
  • Drupal Open Social
Versions: from 0.0.0 before 12.0.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Open Social installations within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive user data, configuration files, or other protected resources, leading to data breaches and privacy violations.

🟠

Likely Case

Unauthorized access to user profiles, private content, or administrative resources that should be restricted to authorized users only.

🟢

If Mitigated

Limited exposure of non-critical resources or partial data access if proper access controls and network segmentation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of Drupal's resource structure but is technically straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.0.5

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-005

Restart Required: No

Instructions:

1. Update Open Social module to version 12.0.5 or later. 2. Clear Drupal caches. 3. Verify proper authorization checks are functioning.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Restrict access to vulnerable endpoints via web server configuration or Drupal access control modules

# Example Apache .htaccess rule
Deny from all

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Open Social instances from sensitive data stores
  • Deploy web application firewall rules to block suspicious resource access patterns

🔍 How to Verify

Check if Vulnerable:

Check Open Social module version in Drupal admin interface or via drush: drush pm-list | grep open_social

Check Version:

drush pm-list | grep open_social

Verify Fix Applied:

Confirm Open Social version is 12.0.5 or higher and test authorization controls on protected resources

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to resource endpoints
  • Multiple failed authorization attempts followed by successful access

Network Indicators:

  • Unexpected data exfiltration from Open Social instances
  • Unusual traffic to resource endpoints

SIEM Query:

source="drupal_access_log" AND (uri CONTAINS "/resource/" OR uri CONTAINS "/api/") AND status=200 AND user="anonymous"

🔗 References

📤 Share & Export