Startseite
  • » Home
  • » Handbuch & FAQ
  • » Forum
  • » Übersetzungsserver
  • » Suche
Startseite › Newsfeed-Generator › Kategorien ›

Drupal Security

Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2020-013

Drupal Core Security - 26 November, 2020 - 00:57
Project: Drupal coreDate: 2020-November-25Security risk: Critical 18∕25 AC:Complex/A:User/CI:All/II:All/E:Exploit/TD:UncommonVulnerability: Arbitrary PHP code executionCVE IDs: CVE-2020-28949CVE-2020-28948Description: 

The Drupal project uses the PEAR Archive_Tar library. The PEAR Archive_Tar library has released a security update that impacts Drupal. For more information please see:

  • CVE-2020-28948
  • CVE-2020-28949

Multiple vulnerabilities are possible if Drupal is configured to allow .tar, .tar.gz, .bz2, or .tlz file uploads and processes them.

To mitigate this issue, prevent untrusted users from uploading .tar, .tar.gz, .bz2, or .tlz files.

This is a different issue than SA-CORE-2019-012. Similar configuration changes may mitigate the problem until you are able to patch.

Solution: 

Install the latest version:

  • If you are using Drupal 9.0, update to Drupal 9.0.9
  • If you are using Drupal 8.9, update to Drupal 8.9.10
  • If you are using Drupal 8.8 or earlier, update to Drupal 8.8.12
  • If you are using Drupal 7, update to Drupal 7.75

Versions of Drupal 8 prior to 8.8.x are end-of-life and do not receive security coverage.

According to the regular security release window schedule, November 25th would not typically be a core security window. However, this release is necessary because there are known exploits for one of core's dependencies and some configurations of Drupal are vulnerable.

Reported By: 
  • Luke Stewart
Fixed By: 
  • Jess of the Drupal Security Team
  • Drew Webber of the Drupal Security Team
  • Michael Hess of the Drupal Security Team
  • Neil Drumm of the Drupal Security Team
  • Lee Rowlands of the Drupal Security Team
Kategorien: Drupal Security

SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider - Critical - Access bypass - SA-CONTRIB-2020-038

Drupal Contrib Security - 18 November, 2020 - 18:27
Project: SAML SP 2.0 Single Sign On (SSO) - SAML Service ProviderDate: 2020-November-18Security risk: Critical 16∕25 AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Access bypassDescription: 

This module enables your users residing at a SAML 2.0 compliant Identity Provider to login to your Drupal website.

The module has two Authentication Bypass vulnerabilities.

Solution: 

Install the latest version:

  • If you use the miniorange_saml module for Drupal 8.x, upgrade to miniorange_saml 8.x-2.14
  • If you use the miniorange_saml module for Drupal 7.x, upgrade to miniorange_saml 7.x-2.54
Reported By: 
  • Heine of the Drupal Security Team
  • Michael Mazzolini
Fixed By: 
  • abhay19
Coordinated By: 
  • Heine of the Drupal Security Team
  • Chris McCafferty of the Drupal Security Team
Kategorien: Drupal Security

Ink Filepicker - Critical - Unsupported - SA-CONTRIB-2020-037

Drupal Contrib Security - 18 November, 2020 - 18:22
Project: Ink FilepickerDate: 2020-November-18Security risk: Critical 17∕25 AC:Basic/A:User/CI:All/II:All/E:Theoretical/TD:DefaultVulnerability: UnsupportedDescription: 

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer.

It looks like the 3rd party service that this module integrates with may have been retired.

If you would like to maintain this project nevertheless, please read: https://www.drupal.org/node/251466#procedure---own-project---unsupported

Solution: 

If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#procedure---own-project---unsupported in full.

Kategorien: Drupal Security

Media: oEmbed - Critical - Remote Code Execution - SA-CONTRIB-2020-036

Drupal Contrib Security - 18 November, 2020 - 18:19
Project: Media: oEmbedDate: 2020-November-18Security risk: Critical 17∕25 AC:Basic/A:User/CI:All/II:All/E:Theoretical/TD:DefaultVulnerability: Remote Code ExecutionDescription: 

Media oEmbed does not properly sanitize certain filenames as described in SA-CORE-2020-012.

Solution: 

Install the latest version:

  • Upgrade to Media oEmbed 7.x-2.8
Reported By: 
  • Alex Pott of the Drupal Security Team
Fixed By: 
  • Samuel Mortenson of the Drupal Security Team
  • Alex Pott of the Drupal Security Team
  • Drew Webber of the Drupal Security Team
Coordinated By: 
  • Samuel Mortenson of the Drupal Security Team
  • Alex Pott of the Drupal Security Team
  • Drew Webber of the Drupal Security Team
  • xjm of the Drupal Security Team
Kategorien: Drupal Security

Drupal core - Critical - Remote code execution - SA-CORE-2020-012

Drupal Core Security - 18 November, 2020 - 18:18
Project: Drupal coreDate: 2020-November-18Security risk: Critical 17∕25 AC:Basic/A:User/CI:All/II:All/E:Theoretical/TD:DefaultVulnerability: Remote code executionCVE IDs: CVE-2020-13671Description: 

Update November 18: Documented longer list of dangerous file extensions

Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations.

Solution: 

Install the latest version:

  • If you are using Drupal 9.0, update to Drupal 9.0.8
  • If you are using Drupal 8.9, update to Drupal 8.9.9
  • If you are using Drupal 8.8 or earlier, update to Drupal 8.8.11
  • If you are using Drupal 7, update to Drupal 7.74

Versions of Drupal 8 prior to 8.8.x are end-of-life and do not receive security coverage.

Additionally, it's recommended that you audit all previously uploaded files to check for malicious extensions. Look specifically for files that include more than one extension, like filename.php.txt or filename.html.gif, without an underscore (_) in the extension. Pay specific attention to the following file extensions, which should be considered dangerous even when followed by one or more additional extensions:

  • phar
  • php
  • pl
  • py
  • cgi
  • asp
  • js
  • html
  • htm
  • phtml

This list is not exhaustive, so evaluate security concerns for other unmunged extensions on a case-by-case basis.

Reported By: 
  • ufku
  • Mark Ferree
  • Frédéric G. Marand
  • Samuel Mortenson of the Drupal Security Team
  • Derek Wright
Fixed By: 
  • Heine of the Drupal Security Team
  • ufku
  • Mark Ferree
  • Michael Hess of the Drupal Security Team
  • David Rothstein of the Drupal Security Team
  • Peter Wolanin of the Drupal Security Team
  • Jess of the Drupal Security Team
  • Frédéric G. Marand
  • Stefan Ruijsenaars
  • David Snopek of the Drupal Security Team
  • Rick Manelius
  • David Strauss of the Drupal Security Team
  • Samuel Mortenson of the Drupal Security Team
  • Ted Bowman
  • Alex Pott of the Drupal Security Team
  • Derek Wright
  • Lee Rowlands of the Drupal Security Team
  • Kim Pepper
  • Wim Leers
  • Nate Lampton
  • Drew Webber of the Drupal Security Team
  • Fabian Franz
  • Alex Bronstein of the Drupal Security Team
  • Neil Drumm of the Drupal Security Team
  • Joseph Zhao
  • Ryan Aslett
Kategorien: Drupal Security

Examples for Developers - Critical - Remote Code Execution - SA-CONTRIB-2020-035

Drupal Contrib Security - 18 November, 2020 - 18:15
Project: Examples for DevelopersDate: 2020-November-18Security risk: Critical 17∕25 AC:Basic/A:User/CI:All/II:All/E:Theoretical/TD:DefaultVulnerability: Remote Code ExecutionDescription: 

The File Example submodule within the Examples project does not properly sanitize certain filenames as described in SA-CORE-2020-012, along with other related vulnerabilities.

Therefore, File Example so is being removed from Examples until a version demonstrating file security best practices can added back in the future.

Solution: 

Any sites that have File Example submodule installed should uninstall it immediately

Then, install the latest version of Examples:

  • If you use Examples 3 (Drupal 9-compatible), upgrade to Examples 3.0.2
  • If you use the Examples module's 8.x-1.x branch, upgrade to Examples 8.x-1.1
Reported By: 
  • Alex Pott of the Drupal Security Team
Fixed By: 
  • Valery Lourie
  • Samuel Mortenson of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
  • Alex Pott of the Drupal Security Team
Coordinated By: 
  • Michael Hess of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
  • Drew Webber of the Drupal Security Team
  • Alex Pott of the Drupal Security Team
Kategorien: Drupal Security

Drupal OAuth Server ( OAuth Provider) - Single Sign On ( SSO ) - Moderately critical - SQL Injection - SA-CONTRIB-2020-034

Drupal Contrib Security - 14 Oktober, 2020 - 15:38
Project: Drupal OAuth Server ( OAuth Provider) - Single Sign On ( SSO )Date: 2020-October-14Security risk: Moderately critical 12∕25 AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:DefaultVulnerability: SQL InjectionDescription: 

This module enables you login into any OAuth 2.0 compliant application using Drupal credentials.

The 8.x branch of the module is vulnerable to SQL injection.

Solution: 

Install the latest version:

  • If you use the Drupal OAuth Server module for Drupal 8.x, upgrade to 8.x-1.1
Reported By: 
  • Jakub Piasecki
Fixed By: 
  • Gaurav Sood
  • Greg Knaddison of the Drupal Security Team
  • Samuel Mortenson of the Drupal Security Team
Coordinated By: 
  • Michael Hess of the Drupal Security Team
Kategorien: Drupal Security

1 Januar, 1970 - 01:00
  • 1
  • 2
  • 3
  • 4
  • nächste Seite ›
  • letzte Seite »

Benutzeranmeldung

  • Registrieren
  • Neues Passwort anfordern

Aktive Forenthemen

  • Wer ist online Block
  • Doppelte Anzeige von Node im View
  • Content Ex-/Import
  • URL-Alias von bestehendem Link wird gelöscht und auf -0 gesetzt 404 Fehler entsteht
  • Ausblenden von Taxonomy wenn diese keinen Inhalt haben
  • Image als Anhang
  • [gelöst] Benutzer erstellen ohne Berechtigung zum ändern von E-Mail oder Passwort
  • HTTP ERROR 500, wenn der Node eines bestimmten Typs gespeichert wird oder ein neuer Inhalt dieses Typs erzeugt werden soll
  • Module modifizieren zb Statuses
  • Exposed Filter einer View in seperatem Block darstellen, wie kann ich die exposed Filter der zug. View deaktivieren
  • Website ohne öffentlichen Zugriff
  • »Geschwister« Nodes anzeigen
Weiter

Neue Kommentare

  • dinmikkith schrieb Ja du hast
    vor 1 Tag 12 Stunden
  • SaarlandToday schrieb Es gibt
    vor 1 Tag 19 Stunden
  • ich hab das Problem gefunden!
    vor 1 Tag 21 Stunden
  • Sorry, das mit dem Theme war
    vor 1 Tag 21 Stunden
  • Zitat: Es gibt in den
    vor 1 Tag 21 Stunden
  • Es gibt in dem Template das
    vor 2 Tagen 8 Stunden
  • Zitat: da es dort eine
    vor 2 Tagen 8 Stunden
  • Sorry, dachte das ich das
    vor 2 Tagen 11 Stunden
  • Ich habe den Fehler gemacht
    vor 2 Tagen 12 Stunden
  • Kein zusätzliches Modul nötig
    vor 2 Tagen 13 Stunden

Statistik

Beiträge im Forum: 245939
Registrierte User: 18824

Neue User:

  • Damian1802
  • MrWebMV
  • kiba

» Alle User anzeigen

User nach Punkten sortiert:
wla9007
stBorchert6003
quiptime4972
Tobias Bähr4019
bv3916
ronald3829
md3717
Thoor3678
Alexander Langer3416
Exterior2903
» User nach Punkten
Zur Zeit sind 0 User und 5 Gäste online.

Drupal Security

  • Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2020-013
  • SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider - Critical - Access bypass - SA-CONTRIB-2020-038
  • Ink Filepicker - Critical - Unsupported - SA-CONTRIB-2020-037
  • Media: oEmbed - Critical - Remote Code Execution - SA-CONTRIB-2020-036
  • Drupal core - Critical - Remote code execution - SA-CORE-2020-012
Weiter

Hauptmenü

  • » Home
  • » Handbuch & FAQ
  • » Forum
  • » Übersetzungsserver
  • » Suche

Quicklinks I

  • Infos
  • Drupal Showcase
  • Installation
  • Update
  • Forum
  • Team
  • Verhaltensregeln

Quicklinks II

  • Drupal Jobs
  • FAQ
  • Drupal-Kochbuch
  • Best Practice - Drupal Sites - Guidelines
  • Drupal How To's

Quicklinks III

  • Tipps & Tricks
  • Drupal Theme System
  • Theme Handbuch
  • Leitfaden zur Entwicklung von Modulen

RSS & Twitter

  • Drupal Planet deutsch
  • RSS Feed News
  • RSS Feed Planet
  • Twitter Drupalcenter
Drupalcenter Team | Impressum & Datenschutz | Kontakt
Angetrieben von Drupal | Drupal is a registered trademark of Dries Buytaert.
Drupal Initiative - Drupal Association