CVE-2024-13251

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to gain elevated privileges through incorrect privilege assignment in Drupal's Registration role module. It affects all Drupal sites using Registration role module versions before 2.0.1. Successful exploitation could lead to unauthorized administrative access.

💻 Affected Systems

Products:
  • Drupal Registration role module
Versions: 0.0.0 through 2.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Drupal installations using the vulnerable Registration role module versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative privileges, enabling complete site takeover, data manipulation, and potential server compromise.

🟠

Likely Case

Unauthorized users gain elevated permissions, potentially accessing sensitive content or performing restricted actions.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to specific role-based actions rather than full administrative takeover.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user access to exploit privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.1

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-015

Restart Required: No

Instructions:

1. Update Registration role module to version 2.0.1 via Drupal's update manager. 2. Clear Drupal cache. 3. Verify role permissions are correctly assigned.

🔧 Temporary Workarounds

Disable Registration role module

all

Temporarily disable the vulnerable module until patching is possible

drush pm-disable registration_role

🧯 If You Can't Patch

  • Implement strict role-based access controls and monitor for unusual permission changes
  • Restrict user registration and implement additional authentication layers

🔍 How to Verify

Check if Vulnerable:

Check Registration role module version in Drupal admin interface or via 'drush pm-list | grep registration_role'

Check Version:

drush pml | grep registration_role

Verify Fix Applied:

Confirm module version is 2.0.1 or higher and test role assignment functionality

📡 Detection & Monitoring

Log Indicators:

  • Unexpected role assignment changes
  • User privilege escalation events
  • Failed permission checks

Network Indicators:

  • Unusual authentication patterns
  • Multiple role modification requests

SIEM Query:

source="drupal" AND (event_type="role_change" OR message="*permission*escalat*")

🔗 References

📤 Share & Export