CVE-2024-13243

6.5 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Drupal Entity Delete Log module that allows attackers to perform forceful browsing to access unauthorized functionality. It affects all Drupal sites using Entity Delete Log module versions before 1.1.1. The vulnerability enables unauthorized users to bypass access controls.

💻 Affected Systems

Products:
  • Drupal Entity Delete Log module
Versions: 0.0.0 through 1.1.0
Operating Systems: All operating systems running Drupal
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the Entity Delete Log module installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete or manipulate entity logs without authorization, potentially covering tracks of other malicious activities or disrupting audit trails.

🟠

Likely Case

Unauthorized users accessing entity deletion logs they shouldn't see, potentially exposing sensitive information about content deletions.

🟢

If Mitigated

With proper access controls and module updates, the risk is limited to authorized users only accessing their permitted data.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some Drupal knowledge but is straightforward once an attacker identifies the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.1

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-007

Restart Required: No

Instructions:

1. Update the Entity Delete Log module to version 1.1.1 or later via Drupal's update manager or Composer. 2. Clear Drupal caches after update. 3. Verify the module is functioning correctly.

🔧 Temporary Workarounds

Disable Entity Delete Log module

all

Temporarily disable the vulnerable module until patching is possible

drush pm:disable entity_delete_log

Implement access control via Drupal permissions

all

Review and restrict user permissions for entity deletion logging

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the Drupal admin interface
  • Enable detailed logging and monitoring for unauthorized access attempts to entity deletion endpoints

🔍 How to Verify

Check if Vulnerable:

Check if Entity Delete Log module is installed and its version is below 1.1.1 via Drupal's Extend page or using 'drush pm:list | grep entity_delete_log'

Check Version:

drush pm:list --fields=name,version | grep entity_delete_log

Verify Fix Applied:

Confirm module version is 1.1.1 or higher and test that unauthorized users cannot access entity deletion logs

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to entity deletion log endpoints
  • Multiple failed permission checks for entity_delete_log routes

Network Indicators:

  • Unusual requests to /admin/reports/entity-delete-log or similar entity logging paths

SIEM Query:

source="drupal" AND (uri_path="*entity-delete-log*" OR module="entity_delete_log") AND (response_code=403 OR user_role!="administrator")

🔗 References

📤 Share & Export