Vulnerability of Drupal RESTful: privilege escalation Synthesis of the vulnerability An attacker can bypass restrictions of Drupal RESTful, in order to escalate his privileges.Severity of this threat: 2/4. Creation date: 16/02/2017. Références of this weakness: DRUPAL-SA-CONTRIB-2017-018, VIGILANCE-VUL-21860. Description of the vulnerability An attacker can bypass restrictions of Drupal RESTful, in order to escalate his privileges.Full Vigil@nce bulletin... (Request your free trial)This security bulletin impacts software or systems such as Drupal Modules ~ not comprehensive. Our Vigil@nce team determined that the severity of this cybersecurity announce is medium. The trust level is of type confirmed by the editor, with an origin of document. An attacker with a expert ability can exploit this vulnerability alert. Solutions for this threat Drupal RESTful: version 7.x-2.16. The version 7.x-2.16 is fixed: https://www.drupal.org/project/restful Drupal RESTful: version 7.x-1.8. The version 7.x-1.8 is fixed: https://www.drupal.org/project/restful Full Vigil@nce bulletin... (Request your free trial) Computer vulnerabilities tracking service Vigil@nce provides a network vulnerability workaround. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.