CVE-2024-13258

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authorization controls in Drupal's REST & JSON API Authentication module, enabling forceful browsing to access restricted resources. It affects all Drupal sites using this module from version 0.0.0 up to (but not including) 2.0.13.

💻 Affected Systems

Products:
  • Drupal REST & JSON API Authentication module
Versions: 0.0.0 to 2.0.12
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the REST & JSON API Authentication module installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive data, administrative functions, or user accounts, potentially leading to complete site compromise.

🟠

Likely Case

Unauthorized access to protected API endpoints, data exfiltration, or privilege escalation.

🟢

If Mitigated

Limited impact if proper network segmentation and additional authentication layers are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending crafted requests to vulnerable API endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.13

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-022

Restart Required: No

Instructions:

1. Update the module via Drupal's admin interface or Composer. 2. Run database updates if required. 3. Clear all caches.

🔧 Temporary Workarounds

Disable vulnerable module

all

Temporarily disable the REST & JSON API Authentication module if immediate patching isn't possible.

drush pm:disable rest_api_authentication

Restrict API access

all

Use web application firewall rules to restrict access to REST/JSON API endpoints.

🧯 If You Can't Patch

  • Implement strict network access controls to limit API endpoint exposure
  • Add additional authentication layers (API keys, IP whitelisting) for sensitive endpoints

🔍 How to Verify

Check if Vulnerable:

Check module version via Drupal admin at /admin/modules or using 'drush pm:list | grep rest_api_authentication'

Check Version:

drush pm:list --fields=name,version | grep rest_api_authentication

Verify Fix Applied:

Confirm module version is 2.0.13 or higher and test authorization controls on protected endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to REST/JSON endpoints
  • Unusual API request patterns from single sources

Network Indicators:

  • Spike in requests to /jsonapi/* or /rest/* endpoints
  • Requests bypassing expected authentication flows

SIEM Query:

source="drupal_access_log" AND (uri_path="/jsonapi/*" OR uri_path="/rest/*") AND status_code=200 AND user="anonymous"

🔗 References

📤 Share & Export