CVE-2024-13291

7.3 HIGH

📋 TL;DR

This vulnerability in Drupal's Basic HTTP Authentication module allows attackers to bypass authorization checks and access restricted content through forceful browsing. It affects Drupal 7 sites using the Basic HTTP Authentication module versions 7.x-1.0 through 7.x-1.3. Attackers can exploit this to view content they shouldn't have permission to access.

💻 Affected Systems

Products:
  • Drupal Basic HTTP Authentication module
Versions: 7.x-1.0 through 7.x-1.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal 7 sites with the Basic HTTP Authentication module enabled and configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive administrative interfaces, user data, or confidential content, potentially leading to data breaches or privilege escalation.

🟠

Likely Case

Unauthorized users access restricted content pages, user profiles, or administrative sections they shouldn't be able to view.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized viewing of non-critical content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires understanding of Drupal's URL structure and access patterns. Attackers need to know or guess restricted URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.x-1.4

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-057

Restart Required: No

Instructions:

1. Update the Basic HTTP Authentication module to version 7.x-1.4 via Drupal's update manager or manually. 2. Clear Drupal caches. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable Basic HTTP Authentication module

all

Temporarily disable the vulnerable module until patching is possible

drush pm-disable basic_auth

🧯 If You Can't Patch

  • Implement additional access controls at web server level (e.g., .htaccess restrictions)
  • Enable detailed logging and monitoring for unauthorized access attempts to restricted URLs

🔍 How to Verify

Check if Vulnerable:

Check if Basic HTTP Authentication module is enabled and version is between 7.x-1.0 and 7.x-1.3

Check Version:

drush pml | grep basic_auth

Verify Fix Applied:

Confirm module version is 7.x-1.4 or higher and test access to restricted content

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200/403 responses to restricted URLs from same IP
  • Access patterns showing users viewing content outside their permissions

Network Indicators:

  • Unusual HTTP GET requests to admin or restricted paths

SIEM Query:

source="drupal_access_log" AND (status=200 OR status=403) AND uri IN ("/admin/*", "/user/*", "/node/*/edit") | stats count by src_ip uri

🔗 References

📤 Share & Export