CVE-2024-13244

8.8 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in Drupal Migrate Tools allows attackers to trick authenticated administrators into performing unauthorized actions. This affects Drupal sites using the Migrate Tools module, potentially leading to data manipulation or system configuration changes. All Drupal installations with vulnerable versions of the Migrate Tools module are affected.

💻 Affected Systems

Products:
  • Drupal Migrate Tools
Versions: 0.0.0 through 6.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the Migrate Tools module installed and enabled. Requires authenticated administrator sessions to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate migration configurations, import malicious content, delete data, or alter system settings by tricking administrators into clicking malicious links while authenticated.

🟠

Likely Case

Attackers create fake migration configurations or modify existing ones to import unwanted content, potentially leading to site defacement or data corruption.

🟢

If Mitigated

With proper CSRF protections and administrator awareness, the risk is limited to authenticated sessions where users click untrusted links while logged in.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated administrators into clicking malicious links. No authentication bypass is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.3

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-008

Restart Required: No

Instructions:

1. Update the Migrate Tools module to version 6.0.3 or later via Drupal's update manager. 2. Clear Drupal caches after update. 3. Verify the update was successful by checking the module version.

🔧 Temporary Workarounds

CSRF Token Enforcement

all

Implement custom CSRF token validation for Migrate Tools forms if immediate patching isn't possible

🧯 If You Can't Patch

  • Disable the Migrate Tools module if not actively needed
  • Implement strict access controls and educate administrators about CSRF risks

🔍 How to Verify

Check if Vulnerable:

Check the Migrate Tools module version in Drupal's Extend page or via drush: drush pm-list | grep migrate_tools

Check Version:

drush pm-list --fields=name,version --format=json | grep migrate_tools

Verify Fix Applied:

Confirm Migrate Tools version is 6.0.3 or higher and test migration operations with CSRF tokens enabled

📡 Detection & Monitoring

Log Indicators:

  • Unexpected migration operations from unusual IP addresses
  • Multiple failed CSRF token validations for migrate-related endpoints

Network Indicators:

  • POST requests to /admin/structure/migrate/* without proper referrer headers
  • Unusual migration-related API calls

SIEM Query:

source="drupal.log" AND ("migrate" AND "CSRF" OR "token validation failed")

🔗 References

📤 Share & Export