Biztonsági figyelmeztetések

Node Embed - Less critical - Denial of Service - SA-CONTRIB-2016-034

Biztonsági figyelmeztetések (contrib) - 2016. június 8. 16.23
Description

This module enables you to embed the contents of one node in the body field of another.

The module doesn't sufficiently protect against a node being embedded in itself, or a loop being created of one node being embedded in another which is then itself embedded in the first node.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission to create content which allows other content to be embedded.

CVE identifier(s) issued
  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
  • All Node Embed 7.x-1.x versions.

Drupal core is not affected. If you do not use the contributed Node Embed module, there is nothing you need to do.

Solution
  • If you use the Node Embed module for Drupal 7.x you should uninstall it.

Also see the Node Embed project page.

Reported by Fixed by
  • Not applicable.
Coordinated by
  • Not applicable.
Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Page Manager Search - Moderately Critical - Information disclosure - SA-CONTRIB-2016-032

Biztonsági figyelmeztetések (contrib) - 2016. június 8. 15.58
Description

This module enables you to make Panels pages (and other pages managed by CTools' Page Manager submodule) indexible and searchable through the standard Search module provided in Drupal core.

The module doesn't block access to Page Manager pages which have been disabled.

CVE identifier(s) issued
  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
  • Page Manager Search 7.x-1.x versions prior to 7.x-1.2.

Drupal core is not affected. If you do not use the contributed Page manager search module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Page manager search project page.

Reported by Fixed by Coordinated by Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

REST JSON - Multiple Vulnerabilities - Highly Critical - Unsupported - SA-CONTRIB-2016-033

Biztonsági figyelmeztetések (contrib) - 2016. június 8. 15.56
Description

This module enables you to expose content, users and comments via a JSON API.
The module contains multiple vulnerabilities including

  • Node access bypass
  • Comment access bypass
  • User enumeration
  • Field access bypass
  • User registration bypass
  • Blocked user login
  • Session name guessing
  • Session enumeration

CVE identifier(s) issued
  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
  • All 7.x-1.x versions

Drupal core is not affected. If you do not use the contributed REST JSON module, there is nothing you need to do.

Drupal core is not affected. If you do not use the contributed REST/JSON module, there is nothing you need to do.

Solution

If you use the REST JSON module for Drupal 7.x you should uninstall it.

Also see the REST/JSON project page.

Reported by Fixed by

Not applicable

Coordinated by Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: Drupal 7.x