CVE-2024-13312

5.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in Drupal Open Social that allows forceful browsing (accessing restricted pages without proper permissions). It affects Open Social installations running vulnerable versions, potentially allowing unauthorized users to access privileged content or functionality.

💻 Affected Systems

Products:
  • Drupal Open Social
Versions: from 11.8.0 before 12.3.10, from 12.4.0 before 12.4.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal Open Social module installations, not core Drupal.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could access administrative interfaces, sensitive user data, or perform privileged actions leading to data breach or system compromise.

🟠

Likely Case

Authenticated users could escalate privileges to access content or features beyond their intended permissions, potentially viewing private data or performing unauthorized actions.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the affected Open Social instance only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of Drupal's routing system but is straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.3.10 or 12.4.9

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-076

Restart Required: No

Instructions:

1. Update Open Social module to version 12.3.10 (for 12.3.x branch) or 12.4.9 (for 12.4.x branch). 2. Clear Drupal caches. 3. Verify authorization checks are working.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Implement additional access control checks at web server level or Drupal hooks

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Open Social instance
  • Add additional authorization checks in custom code or middleware

🔍 How to Verify

Check if Vulnerable:

Check Open Social module version via Drupal admin interface or by examining the module's info.yml file

Check Version:

drush pm-list | grep open_social

Verify Fix Applied:

Verify Open Social module version is 12.3.10 or higher (12.3.x branch) or 12.4.9 or higher (12.4.x branch)

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to privileged routes
  • Access to admin pages from non-admin users

Network Indicators:

  • Unusual access patterns to privileged endpoints

SIEM Query:

source="drupal" AND (event_type="access_denied" OR event_type="page_not_found") AND uri CONTAINS "/admin/" OR uri CONTAINS "/user/"

🔗 References

📤 Share & Export