CVE-2024-13253

9.1 CRITICAL

📋 TL;DR

This CVE describes an incorrect authorization vulnerability in Drupal's Advanced PWA inc Push Notifications module that allows forceful browsing. Attackers can bypass intended access controls to access restricted functionality or data. All Drupal sites using affected versions of this module are vulnerable.

💻 Affected Systems

Products:
  • Drupal Advanced PWA inc Push Notifications module
Versions: 0.0.0 through 1.4.x
Operating Systems: All operating systems running Drupal
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the Advanced PWA inc Push Notifications module installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative privileges, modify site content, steal sensitive user data, or install backdoors for persistent access.

🟠

Likely Case

Unauthorized users access restricted administrative functions, modify push notification settings, or view sensitive configuration data.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but authorization bypass still possible within the application.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires some authentication but authorization bypass allows escalation. Attack path is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.0

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-017

Restart Required: No

Instructions:

1. Update the module to version 1.5.0 via Drupal's update manager or Composer. 2. Clear Drupal caches. 3. Verify the module version in reports.

🔧 Temporary Workarounds

Disable the module

all

Temporarily disable the Advanced PWA inc Push Notifications module until patching is possible

drush pm-disable advanced_pwa_inc_push_notifications

Restrict access via .htaccess

linux

Add access restrictions to module directories

Order deny,allow
Deny from all

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the Drupal admin interface
  • Enable detailed logging and monitoring for unauthorized access attempts to module functionality

🔍 How to Verify

Check if Vulnerable:

Check if the module is installed and version is below 1.5.0 via Drupal's Extend page or using drush: drush pm-list | grep advanced_pwa_inc_push_notifications

Check Version:

drush pm-list --fields=name,version --format=json | grep advanced_pwa_inc_push_notifications

Verify Fix Applied:

Confirm module version is 1.5.0 or higher and test authorization controls for module functionality

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to module admin pages
  • Unexpected modifications to push notification settings
  • Access to /admin/config/services/advanced-pwa-inc-push-notifications by non-admin users

Network Indicators:

  • HTTP requests to module admin endpoints from unauthorized IPs
  • Unusual spike in requests to push notification endpoints

SIEM Query:

source="drupal" AND (uri_path="/admin/config/services/advanced-pwa-inc-push-notifications" OR module="advanced_pwa_inc_push_notifications") AND user_role!="administrator"

🔗 References

📤 Share & Export