Startseite
  • » Home
  • » Handbuch & FAQ
  • » Forum
  • » Übersetzungsserver
  • » Suche
Startseite › Newsfeed-Generator › Kategorien ›

Drupal Security

jQuery UI Checkboxradio - Moderately critical - Cross site scripting - SA-CONTRIB-2022-052

Drupal Contrib Security - 10 August, 2022 - 17:09
Project: jQuery UI CheckboxradioVersion: 8.x-1.38.x-1.28.x-1.18.x-1.0Date: 2022-August-10Security risk: Moderately critical 13∕25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:UncommonVulnerability: Cross site scriptingDescription: 

jQuery UI is a third-party library used by Drupal. The jQuery UI Checkboxradio module provides the jQuery UI Checkboxradio library (which was previously in Drupal 8 core, but has since been removed from core and moved to this module).

As part of the jQuery UI 1.13.2 update, the jQuery UI project disclosed following security issue that may affect sites using the jQuery UI Checkboxradio module:

  • CVE-2022-31160: XSS when refreshing a checkboxradio with an HTML-like initial text label
Solution: 

Install the latest version. If you use the jQuery UI Checkboxradio module for Drupal 9, upgrade to:

  • jQuery UI Checkboxradio 8.x-1.4.
Reported By: 
  • Benji Fisher, provisional member of the Drupal Security Team
Fixed By: 
  • Benji Fisher, provisional member of the Drupal Security Team
  • xjm of the Drupal Security Team
  • Lauri Eskola, provisional member of the Drupal Security Team
  • Greg Knaddison of the Drupal Security Team
Coordinated By: 
  • xjm of the Drupal Security Team
Kategorien: Drupal Security

Tagify - Moderately critical - Access bypass - SA-CONTRIB-2022-051

Drupal Contrib Security - 27 Juli, 2022 - 19:07
Project: TagifyVersion: 1.0.41.0.31.0.2-beta11.0.1-beta11.0.0-beta1Date: 2022-July-27Security risk: Moderately critical 11∕25 AC:Complex/A:User/CI:None/II:Some/E:Exploit/TD:UncommonVulnerability: Access bypassDescription: 

This module provides a widget to transform entity reference fields into a more user-friendly tags input component with a great performance.

The module doesn't sufficiently check access for the add operation. Users with permission to edit content can view and reference unpublished terms. The edit form may expose term data that users could not otherwise see, since there is no term view route by default.

This vulnerability is slightly mitigated by the fact that an attacker must have a role with the permission "access content", so may not be accessible to anonymous users on all sites.

Solution: 

Install the latest version:

  • If you use the Tagify module for Drupal 9.x, upgrade to Tagify 1.0.5
Reported By: 
  • Conrad Lara
Fixed By: 
  • David Galeano
  • Conrad Lara
Coordinated By: 
  • Damien McKenna of the Drupal Security Team
  • Greg Knaddison of the Drupal Security Team
Kategorien: Drupal Security

PDF generator API - Moderately critical - Remote Code Execution - SA-CONTRIB-2022-050

Drupal Contrib Security - 27 Juli, 2022 - 19:03
Project: PDF generator APIVersion: 2.2.12.2.02.1.02.0.0Date: 2022-July-27Security risk: Moderately critical 12∕25 AC:Complex/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Remote Code ExecutionDescription: 

This module enables you to generate PDF versions of content.

Some installations of the module make use of the dompdf/dompdf third-party dependency.

Security vulnerabilities exist for versions of dompdf/dompdf before 2.0.0 as described in the 2.0.0 release notes.

Solution: 

Install the latest version:

  • If you use the pdf_api module for Drupal 2.x, upgrade to pdf_api 2.2.2
Reported By: 
  • tedfordgif
  • David Archuleta
Fixed By: 
  • tedfordgif
  • Nigel Cunningham
Coordinated By: 
  • Damien McKenna of the Drupal Security Team
  • Greg Knaddison of the Drupal Security Team
Kategorien: Drupal Security

Context - Moderately critical - Cross Site Scripting - SA-CONTRIB-2022-049

Drupal Contrib Security - 27 Juli, 2022 - 18:59
Project: ContextVersion: 7.x-3.107.x-3.97.x-3.87.x-3.77.x-3.67.x-3.57.x-3.47.x-3.37.x-3.27.x-3.17.x-3.07.x-3.0-rc17.x-3.0-beta77.x-3.0-beta67.x-3.0-beta57.x-3.0-beta47.x-3.0-beta37.x-3.0-beta27.x-3.0-beta17.x-3.0-alpha37.x-3.0-alpha27.x-3.0-alpha1Date: 2022-July-27Security risk: Moderately critical 12∕25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross Site ScriptingDescription: 

This module enables you to conditionally display blocks in particular theme regions.

The module doesn't sufficiently sanitize the title of a block as displayed in the admin UI when a site administrator edits a context block reaction.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer blocks".

Solution: 

Install the latest version:

  • If you use the Context module for Drupal 7.x, upgrade to Context 7.x-3.11.
Reported By: 
  • Harold Aling
Fixed By: 
  • Harold Aling
  • Bostjan Kovac
  • Nedjo Rogers
Coordinated By: 
  • Damien McKenna of the Drupal Security Team
  • Greg Knaddison of the Drupal Security Team
  • Michael Hess of the Drupal Security Team
Kategorien: Drupal Security

Drupal core - Moderately critical - Multiple vulnerabilities - SA-CORE-2022-015

Drupal Core Security - 20 Juli, 2022 - 17:41
Project: Drupal coreDate: 2022-July-20Security risk: Moderately critical 11∕25 AC:Complex/A:User/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Multiple vulnerabilitiesCVE IDs: CVE-2022-25276Description: 

The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities.

This advisory is not covered by Drupal Steward.

Solution: 

Install the latest version:

  • If you are using Drupal 9.4, update to Drupal 9.4.3.
  • If you are using Drupal 9.3, update to Drupal 9.3.19.

All versions of Drupal 9 prior to 9.3.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.

Drupal 7 core does not include the Media module and therefore is not affected.

Reported By: 
  • Heine of the Drupal Security Team
Fixed By: 
  • Lee Rowlands of the Drupal Security Team
  • Alex Pott of the Drupal Security Team
  • Samuel Mortenson
  • xjm of the Drupal Security Team
  • Heine of the Drupal Security Team
  • Joseph Zhao, provisional member of the Drupal Security Team
  • Vijay Mani, provisional member of the Drupal Security Team
  • Alex Bronstein of the Drupal Security Team
  • Neil Drumm of the Drupal Security Team
  • Benji Fisher, provisional member of the Drupal Security Team
  • Jen Lampton, provisional member of the Drupal Security Team
  • Dave Long, provisional member of the Drupal Security Team
Kategorien: Drupal Security

Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2022-014

Drupal Core Security - 20 Juli, 2022 - 17:40
Project: Drupal coreDate: 2022-July-20Security risk: Critical 15∕25 AC:Basic/A:Admin/CI:All/II:All/E:Theoretical/TD:UncommonVulnerability: Arbitrary PHP code executionCVE IDs: CVE-2022-25277Description: 

Updated 2022-07-20 19:45 UTC to indicate that this only affects Apache web servers.

Drupal core sanitizes filenames with dangerous extensions upon upload (reference: SA-CORE-2020-012) and strips leading and trailing dots from filenames to prevent uploading server configuration files (reference: SA-CORE-2019-010).

However, the protections for these two vulnerabilities previously did not work correctly together. As a result, if the site were configured to allow the upload of files with an htaccess extension, these files' filenames would not be properly sanitized. This could allow bypassing the protections provided by Drupal core's default .htaccess files and possible remote code execution on Apache web servers.

This issue is mitigated by the fact that it requires a field administrator to explicitly configure a file field to allow htaccess as an extension (a restricted permission), or a contributed module or custom code that overrides allowed file uploads.

Solution: 

Install the latest version:

  • If you are using Drupal 9.4, update to Drupal 9.4.3.
  • If you are using Drupal 9.3, update to Drupal 9.3.19.

All versions of Drupal 9 prior to 9.3.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.

Drupal 7 core is not affected.

Auditing your files directory's .htaccess to ensure it has not been overwritten or overridden in a subdirectory

If your web server uses Apache httpd with AllowOverride, you should check within your files directories and subdirectories to ensure that any .htaccess files present are intentional. You can search for files named .htaccess by running the following command in the roots of both your public and private files directory:

find ./ -name ".htaccess" -print

Drupal automatically creates .htaccess files like the following in the root of the public files directory:

# Turn off all options we don't need. Options -Indexes -ExecCGI -Includes -MultiViews # Set the catch-all handler to prevent scripts from being executed. SetHandler Drupal_Security_Do_Not_Remove_See_SA_2006_006 <Files *> # Override the handler again if we're run later in the evaluation list. SetHandler Drupal_Security_Do_Not_Remove_See_SA_2013_003 </Files> # If we know how to do it safely, disable the PHP engine entirely. <IfModule mod_php7.c> php_flag engine off </IfModule> <IfModule mod_php.c> php_flag engine off </IfModule>

Check with your system administrator for the correct .htaccess configuration for the given files directory.

This advisory is not covered by Drupal Steward.

Reported By: 
  • Elar Lang
Fixed By: 
  • Peter Wolanin of the Drupal Security Team
  • xjm of the Drupal Security Team
  • Drew Webber of the Drupal Security Team
  • Alex Bronstein of the Drupal Security Team
  • Greg Knaddison of the Drupal Security Team
  • Jen Lampton, provisional member of the Drupal Security Team
  • Lee Rowlands of the Drupal Security Team
  • Dave Long, provisional member of the Drupal Security Team
Kategorien: Drupal Security

Drupal core - Moderately critical - Access Bypass - SA-CORE-2022-013

Drupal Core Security - 20 Juli, 2022 - 17:35
Project: Drupal coreDate: 2022-July-20Security risk: Moderately critical 12∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Access BypassCVE IDs: CVE-2022-25278Description: 

Under certain circumstances, the Drupal core form API evaluates form element access incorrectly. This may lead to a user being able to alter data they should not have access to.

No forms provided by Drupal core are known to be vulnerable. However, forms added through contributed or custom modules or themes may be affected.

This advisory is not covered by Drupal Steward.

Solution: 

Install the latest version:

  • If you are using Drupal 9.4, update to Drupal 9.4.3.
  • If you are using Drupal 9.3, update to Drupal 9.3.19.

All versions of Drupal 9 prior to 9.3.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.

Drupal 7 core is not affected.

Reported By: 
  • Pierre Rudloff
Fixed By: 
  • Pierre Rudloff
  • Tim Plunkett
  • Heine of the Drupal Security Team
  • Alex Bronstein of the Drupal Security Team
  • xjm of the Drupal Security Team
  • Lauri Eskola, provisional member of the Drupal Security Team
  • Dave Long, provisional member of the Drupal Security Team
  • Lee Rowlands of the Drupal Security Team
Kategorien: Drupal Security

Drupal core - Moderately critical - Information Disclosure - SA-CORE-2022-012

Drupal Core Security - 20 Juli, 2022 - 17:34
Project: Drupal coreDate: 2022-July-20Security risk: Moderately critical 13∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Information DisclosureCVE IDs: CVE-2022-25275Description: 

In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system.

Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability.

This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9) $config['image.settings']['allow_insecure_derivatives'] or (Drupal 7) $conf['image_allow_insecure_derivatives'] to TRUE. The recommended and default setting is FALSE, and Drupal core does not provide a way to change that in the admin UI.

Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing files or image styles after updating.

Solution: 

Install the latest version:

  • If you are using Drupal 9.4, update to Drupal 9.4.3.
  • If you are using Drupal 9.3, update to Drupal 9.3.19.
  • If you are using Drupal 7, update to Drupal 7.91.

All versions of Drupal 9 prior to 9.3.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.

Reported By: 
  • Guy Elsmore-Paddock
  • Conrad Lara
Fixed By: 
  • Lee Rowlands of the Drupal Security Team
  • Conrad Lara
  • mondrake
  • Alex Bronstein of the Drupal Security Team
  • Dave Reid of the Drupal Security Team
  • xjm of the Drupal Security Team
  • Guy Elsmore-Paddock
  • Dave Long Provisional Member of the Drupal Security Team
  • Lauri Eskola Provisional Member of the Drupal Security Team
  • David Strauss of the Drupal Security Team
  • Benji Fisher Provisional Member of the Drupal Security Team
  • Alex Pott of the Drupal Security Team
  • Drew Webber of the Drupal Security Team
  • Fabian Franz
Kategorien: Drupal Security

Entity Print - Moderately critical - Multiple: Remote Code Execution, Information disclosure - SA-CONTRIB-2022-048

Drupal Contrib Security - 13 Juli, 2022 - 17:44
Project: Entity PrintDate: 2022-July-13Security risk: Moderately critical 13∕25 AC:Complex/A:User/CI:Some/II:Some/E:Proof/TD:DefaultVulnerability: Multiple: Remote Code Execution, Information disclosureDescription: 

This module enables you to generate print versions of content.
Some installations of the module make use of the dompdf/dompdf third-party dependency.
Security vulnerabilities exist for versions of dompdf/dompdf < 2.0.0

See the library release notes for more detail: https://github.com/dompdf/dompdf/releases/tag/v2.0.0

Note on 3rd party vulnerabilities

This security advisory corresponds to a 3rd party vulnerability. Normally the Drupal Security Team would not issue advisories related to 3rd party code that is shipped separately from a module per our policy (most recent update is PSA-2019-09-04). In this case, because the module required a specific version and could not be updated without a change to the Drupal module we do issue an advisory.

Solution: 

Install the latest version (8.x-2.6) of this module and update dompdf/dompdf at the same time. It is recommended to use composer to do the update using commands similar to the following:

composer update drupal/entity_print
composer require dompdf/dompdf:~2 Reported By: 
  • szato
  • Munavir P k
Fixed By: 
  • Lee Rowlands of the Drupal Security Team
  • Carlos Santana
  • Manoj Selvan
Coordinated By: 
  • Lee Rowlands of the Drupal Security Team
  • Greg Knaddison of the Drupal Security Team
Kategorien: Drupal Security

Config Terms - Critical - Access bypass - SA-CONTRIB-2022-047

Drupal Contrib Security - 29 Juni, 2022 - 19:25
Project: Config TermsDate: 2022-June-29Security risk: Critical 15∕25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:AllVulnerability: Access bypassDescription: 

This module enables you to create and manage a version of taxonomy based on configuration entities instead of content. This allows the terms, vocabularies, and their structure to be exported, imported, and managed as site configuration.

The module doesn't sufficiently check access for the edit and delete operations. Users with "access content" permission can edit or delete any term. The edit form may expose term data that users could not otherwise see, since there is no term view route by default.

This vulnerability is slightly mitigated by the fact that an attacker must have a role with the permission "access content", so may not be accessible to anonymous users on all sites.

Solution: 

Install the latest version:

  • If you use the Config Terms module for Drupal 9.x, upgrade to Config Terms 8.x-1.6 or later
Reported By: 
  • Emil Johnsson
Fixed By: 
  • Emil Johnsson
  • Justin Ludwig
Kategorien: Drupal Security

Lottiefiles Field - Moderately critical - Cross Site Scripting - SA-CONTRIB-2022-046

Drupal Contrib Security - 29 Juni, 2022 - 18:51
Project: Lottiefiles FieldDate: 2022-June-29Security risk: Moderately critical 14∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingDescription: 

The Lottiefiles Field module enables you to integrate the lottiefiles features into your page.

The module does not sufficiently filter user-provided text on output, resulting in a Cross-Site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission to create or edit content that has lottiefiles fields.

Solution: 

Install the latest version:

  • If you use the lottifiles_field module for Drupal 8.x or 9.x, upgrade to Lottiefiles Field 1.0.3.
Reported By: 
  • Conrad Lara
Fixed By: 
  • Hari Venu
  • Conrad Lara
Coordinated By: 
  • Greg Knaddison of the Drupal Security Team
Kategorien: Drupal Security

Updated security policy for Drupal core Composer dependencies - PSA-2022-06-20

Drupal PSA Security - 20 Juni, 2022 - 20:18
Date: 2022-June-20Description: In Drupal 9.4 and higher, drupal/core-recommended allows patch-level vendor updates

The drupal/core-recommended metapackage now allows patch-level updates for Composer dependencies. This means that site owners using drupal/core-recommended can now install most Composer dependency security updates themselves, without needing to wait for an upstream release of Drupal core that updates the affected package.

For example, in the future, a Guzzle vendor update like the recent Guzzle security release can be installed by running:

composer update guzzlehttp/guzzle

The change record on drupal/core-recommended and patch-level updates has more detailed information on how this change affects site dependency management.

Drupal security advisories and same-day releases for vendor updates will only be issued if Drupal core is known to be exploitable

It is the Drupal Security Team's policy to create new core releases and issue security advisories for third-party vendor libraries only if an exploit is possible in Drupal core. However, both the earlier version of the drupal/core-recommended metapackage and Drupal.org file archive downloads restrict sites to the exact Composer dependency versions used in Drupal core. Therefore, in practice, we have issued numerous security advisories (or same-day releases without security advisories) where only contributed or custom code might be vulnerable.

For Drupal 9.4.0 and higher, the Security Team plans to no longer issue these "just-in-case" security advisories for Composer dependency security updates. Instead, the dependency updates will be handled as public security hardenings, and will be included alongside other bugfixes in normal Drupal core patch releases. These security hardenings may be released within a few days as off-schedule bugfix releases if contributed projects are known to be vulnerable, or on the next scheduled monthly bugfix window for uncommon or theoretical vulnerabilities. (Keep in mind that Drupal core often already mitigates vulnerabilities present in its dependencies, so automated security scanners sometimes raise false positives when an upstream CVE is announced.)

Site owners are responsible for monitoring security announcements for third-party dependencies as well as for Drupal projects, and for installing dependency security updates when necessary.

Sites built using .tar.gz or .zip file downloads should convert to drupal/core-recommended for same-day dependency updates

Drupal 9.4 sites built with tarball or zip file archives will no longer receive the same level of security support for core dependencies. Going forward, if core is not known to be exploitable, the core file downloads' dependencies will be updated in normal bugfix releases within a few days (if contributed projects are known to be vulnerable) to a few weeks (if the vulnerability is uncommon or theoretical).

Sites built with tarball or zip files should convert to using drupal/core-recommended to apply security updates more promptly than the above timeframe.

Drupal 9.3 will receive prompt, best-effort updates until its end of life

Drupal 9.3 receives security coverage until the release of Drupal 9.5.0 in December 2022, and will not include the above improvement to drupal/core-recommended. Therefore, we will still try to provide prompt releases of Drupal 9.3 for vendor security updates when it is possible for us to do so.

Since normal bugfixes are no longer backported to Drupal 9.3, there will already be few to no other changes between its future releases, so dependency updates may be released as normal bugfix releases (rather than security-only releases). Security advisories for Drupal 9.3 vendor updates may still be issued depending on the nature of the vulnerability.

Drupal 7 is not affected by this change and Drupal 7 core file downloads remain fully covered by the Drupal Security Team

Drupal 7 core includes only limited use of third-party dependencies (in particular, the jQuery and jQuery UI JavaScript packages). Therefore, Drupal 7 is not affected by this policy change. Note that Drupal 7 sites that use third-party libraries with Drupal 7 contributed modules must still monitor and apply updates for those third-party libraries.

For press contacts, please email security-press@drupal.org.

Kategorien: Drupal Security

Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011

Drupal Core Security - 10 Juni, 2022 - 21:39
Project: Drupal coreDate: 2022-June-10Security risk: Moderately critical 13∕25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Third-party librariesCVE IDs: CVE-2022-31042CVE-2022-31043Description: 

Updated 22:00 UTC 2022-06-10: Added steps to update without drupal/core-recommended.

Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released two security advisories:

  • Failure to strip the Cookie header on change in host or HTTP downgrade
  • Fix failure to strip Authorization header on HTTP downgrade

These do not affect Drupal core, but may affect some contributed projects or custom code on Drupal sites.

We are issuing this security advisory outside our regular Drupal security release window schedule since Guzzle has already published information about the vulnerabilities, and vulnerabilities might exist in contributed modules or custom modules that use Guzzle for outgoing requests. Guzzle has rated these vulnerabilities as high-risk.

This advisory is not covered by Drupal Steward.

Solution: 

Install the latest version:

  • If you are using Drupal 9.4, update to Drupal 9.4.0-rc2.
  • If you are using Drupal 9.3, update to Drupal 9.3.16.
  • If you are using Drupal 9.2, update to Drupal 9.2.21.

All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.

Drupal 7 is not affected.

Advanced users may also work around this issue by temporarily using drupal/core instead of drupal/core-recommended and then updating Guzzle to the desired version. More information on managing Guzzle with Drupal 9.4.

Reported By: 
  • GHaddon
  • Jeroen Tubex
  • Yasen Ivanov
Fixed By: 
  • Heine of the Drupal Security Team
  • Dave Long, provisional member of the Drupal Security Team
  • Damien McKenna of the Drupal Security Team
  • Michael Hess of the Drupal Security Team
  • cilefen of the Drupal Security Team
  • xjm of the Drupal Security Team
  • Benji Fisher, provisional member of the Drupal Security Team
Kategorien: Drupal Security

Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-010

Drupal Core Security - 25 Mai, 2022 - 21:39
Project: Drupal coreDate: 2022-May-25Security risk: Moderately critical 13∕25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Third-party librariesCVE IDs: CVE-2022-29248Description: 

Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released a security update which does not affect Drupal core, but may affect some contributed projects or custom code on Drupal sites.

We are issuing this security advisory outside our regular Drupal security release window schedule since Guzzle has already published information about the vulnerability, and vulnerabilities might exist in contributed modules or custom modules that use Guzzle for outgoing requests. Guzzle has rated this vulnerability as high-risk.

This advisory is not covered by Drupal Steward.

Solution: 

Install the latest version:

  • If you are using Drupal 9.3, update to Drupal 9.3.14.
  • If you are using Drupal 9.2, update to Drupal 9.2.20.

All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.

Drupal 7 is not affected.

Reported By: 
  • Dezső BICZÓ
  • mayela
Fixed By: 
  • cilefen of the Drupal Security Team
  • xjm of the Drupal Security Team
  • Dezső BICZÓ
  • Greg Knaddison of the Drupal Security Team
  • Benji Fisher, provisional member of the Drupal Security Team
  • Damien McKenna of the Drupal Security Team
  • Alex Pott of the Drupal Security Team
Kategorien: Drupal Security

Apigee Edge - Moderately critical - Access bypass - SA-CONTRIB-2022-045

Drupal Contrib Security - 25 Mai, 2022 - 19:03
Project: Apigee EdgeDate: 2022-May-25Security risk: Moderately critical 13∕25 AC:None/A:User/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Access bypassDescription: 

The Apigee Edge module allows connecting a Drupal site to Apigee X / Edge in order to build a developer portal. The developers (user) can view API keys for their respective Apps.

The module discloses information by allowing attackers to view cached information of API Keys from the browser cache for a limited time frame after the user login on the same computer.

Solution: 

Install the latest version:

  • If you use the Apigee Edge module version 2.0.x for Drupal 9.x, upgrade to Apigee Edge 2.0.3
  • If you use the Apigee Edge module version 8.x-1.x for Drupal 9.x, upgrade to Apigee Edge 8.x-1.26
Reported By: 
  • Dezső BICZÓ
Fixed By: 
  • Dezső BICZÓ
Coordinated By: 
  • Greg Knaddison of the Drupal Security Team
Kategorien: Drupal Security

Entity Browser Block - Moderately critical - Access bypass - SA-CONTRIB-2022-044

Drupal Contrib Security - 25 Mai, 2022 - 18:53
Project: Entity Browser BlockDate: 2022-May-25Security risk: Moderately critical 13∕25 AC:None/A:User/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Access bypassDescription: 

Entity Browser Block provides a Block Plugin for every Entity Browser on your site.

The module didn't sufficiently check entity view access in the block form.

This vulnerability is mitigated by the fact that an attacker must be able to place a block - either through the core "Block Layout" page or via a module like Layout Builder.

Solution: 

Install the latest version:

  • If you use the entity_browser_block module for Drupal 8+, upgrade to entity_browser_block 8.x-1.2
Reported By: 
  • Dan Flanagan
Fixed By: 
  • Dan Flanagan
  • Samuel Mortenson
Coordinated By: 
  • Greg Knaddison of the Drupal Security Team
Kategorien: Drupal Security

Open Social - Moderately critical - Access bypass - SA-CONTRIB-2022-043

Drupal Contrib Security - 25 Mai, 2022 - 18:49
Project: Open SocialDate: 2022-May-25Security risk: Moderately critical 14∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassDescription: 

Open Social is a Drupal distribution for online communities.

Group entities created within Open Social did not sufficiently check entity access in group overviews, allowing users to see information in the overviews they should not have access to. Visiting the entity directly resulted in correct access checks applied.

This vulnerability is mitigated by the fact that an attacker must be able to view Group entities in an overview and have certain common permissions revoked.

Please note the affected versions were already unsupported, this advisory is released additionally as there are still reported installs for the affected versions.

Solution: 

Install the latest versions:

  • If you use Open Social versions prior to 11.0.0, upgrade to at least Open Social 11.0.0 where this issue is resolved

Preferably use one of the supported versions:

  • Open Social 11.3.0
  • Open Social 11.2.3
  • Open Social 11.1.7
Reported By: 
  • Dmitry Kiselev
Fixed By: 

A variety of people as part of upgrading to version 11.

Coordinated By: 
  • Greg Knaddison of the Drupal Security Team
  • Damien McKenna of the Drupal Security Team
  • Alex Bronstein of the Drupal Security Team
Kategorien: Drupal Security

Embed - Moderately critical - Cross-Site Request Forgery - SA-CONTRIB-2022-042

Drupal Contrib Security - 25 Mai, 2022 - 18:45
Project: EmbedDate: 2022-May-25Security risk: Moderately critical 13∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross-Site Request ForgeryDescription: 

The Drupal Embed module provides a filter to allow embedding various embeddable items like entities in content fields.

In certain circumstances, the filter could allow an unprivileged user to inject HTML into a page when it is accessed by a trusted user with permission to embed items. In some cases, this could lead to Cross-Site Request Forgery.

Solution: 

Install the latest version:

  • If you use the Embed module for Drupal 8.x or 9.x, upgrade to Embed 8.x-1.5
Reported By: 
  • Aaron Zinck
Fixed By: 
  • Dave Reid of the Drupal Security Team
  • Drew Webber of the Drupal Security Team
  • Adam G-H
Coordinated By: 
  • Dave Reid of the Drupal Security Team
Kategorien: Drupal Security

Wingsuit - Storybook for UI Patterns - Critical - Access bypass - SA-CONTRIB-2022-040

Drupal Contrib Security - 18 Mai, 2022 - 19:13
Project: Wingsuit - Storybook for UI PatternsVersion: 8.x-2.x-dev8.x-1.x-devDate: 2022-May-18Security risk: Critical 16∕25 AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Access bypassDescription: 

The Wingsuit module enables site builders to build UI Patterns (and|or) Twig Components with Storybook and use them without any mapping code in Drupal.

The module doesn't have an access check for the admin form allowing an attacker to view and modify the Wingsuit configuration.

Solution: 

Install the latest version:

  • If you use the wingsuit_companion 8.x-1.x module for Drupal 8.x, upgrade to Wingsuit 8.x-1.1
Reported By: 
  • Christian.wiedemann
Fixed By: 
  • Christian.wiedemann
Coordinated By: 
  • Greg Knaddison of the Drupal Security Team
Kategorien: Drupal Security

Duo Two-Factor Authentication - Critical - Unsupported - SA-CONTRIB-2022-039

Drupal Contrib Security - 4 Mai, 2022 - 18:37
Project: Duo Two-Factor AuthenticationDate: 2022-May-04Security risk: Critical 15∕25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:AllVulnerability: UnsupportedDescription: 

The security team is marking this project unsupported. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#procedure---own-project---unsupported.

Kategorien: Drupal Security
  • 1
  • 2
  • 3
  • 4
  • nächste Seite ›
  • letzte Seite »

Benutzeranmeldung

  • Registrieren
  • Neues Passwort anfordern

Aktive Forenthemen

  • Nach Upgrade auf Drupal 9 Fehler im Installationsprofil
  • Es gibt noch Tickets für das DrupalCamping!
  • Komplexe Layouts per Drag & Drop mit Layout Paragraphs
  • Reload der vollständigen Seite
  • [doch nicht gelöst] View zeigt unter Felder falsche Werte
  • Die Splash Awards Deutschland und Österreich sind zurück!
  • [gelöst] Views in Seite einbetten
  • Fehler nach Drupal Core Update auf 7.91
  • (Gelöst) Taxonomie Beziehungen ausblendbar im Backend?
  • Suche Upgradeempfehlungen einer existenten Drupal7 Site auf 9/10?
  • Develop Custom Field in Views
  • Wie View mit einem Array von ids filtern?
Weiter

Neue Kommentare

  • Mein Hinweis sagt, daß du das
    vor 2 Tagen 9 Stunden
  • Erstmal danke für Deine
    vor 2 Tagen 9 Stunden
  • Hast Du diesen Eintrag auch
    vor 2 Tagen 13 Stunden
  • Sehr interessanter und
    vor 3 Tagen 21 Stunden
  • Works as designed – Erwartetes Verhalten
    vor 5 Tagen 20 Stunden
  • Welcher Fehler wird im Drupal
    vor 6 Tagen 11 Stunden
  • Zu früh gefreut. Jetzt
    vor 6 Tagen 13 Stunden
  • Filterkriterien » Hinzufügen » Kategorie » webformulareingabe
    vor 6 Tagen 13 Stunden
  • Müsste da noch ein Filter auf
    vor 6 Tagen 18 Stunden
  • Hast Du mal die Ausgabe des
    vor 6 Tagen 18 Stunden

Statistik

Beiträge im Forum: 247955
Registrierte User: 19631

Neue User:

  • vagneralex3
  • zahid hasan
  • Davidenabs

» Alle User anzeigen

User nach Punkten sortiert:
wla9220
stBorchert6003
quiptime4972
Tobias Bähr4019
bv3924
ronald3845
md3717
Thoor3678
Alexander Langer3416
Exterior2903
» User nach Punkten
Zur Zeit sind 0 User und 2 Gäste online.

Drupal Security

  • jQuery UI Checkboxradio - Moderately critical - Cross site scripting - SA-CONTRIB-2022-052
  • Tagify - Moderately critical - Access bypass - SA-CONTRIB-2022-051
  • PDF generator API - Moderately critical - Remote Code Execution - SA-CONTRIB-2022-050
  • Context - Moderately critical - Cross Site Scripting - SA-CONTRIB-2022-049
  • Drupal core - Moderately critical - Multiple vulnerabilities - SA-CORE-2022-015
Weiter

Hauptmenü

  • » Home
  • » Handbuch & FAQ
  • » Forum
  • » Übersetzungsserver
  • » Suche

Quicklinks I

  • Infos
  • Drupal Showcase
  • Installation
  • Update
  • Forum
  • Team
  • Verhaltensregeln

Quicklinks II

  • Drupal Jobs
  • FAQ
  • Drupal-Kochbuch
  • Best Practice - Drupal Sites - Guidelines
  • Drupal How To's

Quicklinks III

  • Tipps & Tricks
  • Drupal Theme System
  • Theme Handbuch
  • Leitfaden zur Entwicklung von Modulen

RSS & Twitter

  • Drupal Planet deutsch
  • RSS Feed News
  • RSS Feed Planet
  • Twitter Drupalcenter
Drupalcenter Team | Impressum & Datenschutz | Kontakt
Angetrieben von Drupal | Drupal is a registered trademark of Dries Buytaert.
Drupal Initiative - Drupal Association