Hírolvasó

Webform - Critical - Remote Code Execution - SA-CONTRIB-2020-011

Biztonsági figyelmeztetések (contrib) - 2020. május 6. 18.43
Project: WebformDate: 2020-May-06Security risk: Critical 17∕25 AC:Basic/A:Admin/CI:All/II:All/E:Theoretical/TD:AllVulnerability: Remote Code ExecutionDescription: 

This module enables you to build forms and surveys in Drupal.

The module doesn't sufficiently filter webform element properties (attributes) under the scenario of editing a webform. Malicious user could craft such an attribute (#element_validate, for example) that would invoke execution of undesired PHP code.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "Edit own webform" (or "Edit any webform").

Solution: 

Install the latest version:

Also see the Webform project page.

Reported By: Fixed By: Coordinated By: 

JSON:API - Critical - Unsupported - SA-CONTRIB-2020-010

Biztonsági figyelmeztetések (contrib) - 2020. április 15. 17.45
Project: JSON:APIVersion: 8.x-1.26Date: 2020-April-15Security risk: Critical 15∕25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:AllVulnerability: UnsupportedDescription: 

This module provides a JSON API standards-compliant API for accessing and
manipulating Drupal content and configuration entities.

The security team and module maintainers are marking this project unsupported. Both the 8.x-1.x and 8.x-2.x versions are unsupported, and users of either version are strongly encouraged to upgrade to a supported version of Drupal core, which includes a supported version of JSON:API.

The eventual removal of security coverage for the JSON:API contributed module was announced with the release of JSON:API 8.x-1.22 on 28 June 2018.

Additionally, there is a known security issue with the 8.x-1.x branch of the project that will not be fixed by the maintainers. That issue is not present in the 8.x-2.x branch of the project, nor is it present in Drupal core.

Solution: 

Users of the module are encouraged to upgrade to a supported version of Drupal core, which is distributed with a supported version of JSON:API.

If your site is currently using a release from the 8.x-1.x branch of the module, you may be required to apply fixes for the breaking changes documented here.

Also see the JSON:API project page.

Reported By: Fixed By: Coordinated By: 

Spamicide - Critical - Access bypass - SA-CONTRIB-2020-009

Biztonsági figyelmeztetések (contrib) - 2020. április 8. 18.14
Project: SpamicideDate: 2020-April-08Security risk: Critical 18∕25 AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Access bypassDescription: 

The Spamicide module protects Drupal forms with a form field that is hidden from normal users, but visible to spam bots.

The module doesn't require appropriate permissions for administrative pages leading to an Access Bypass.

Solution: 

Install the latest version:

Also see the Spamicide project page.

Reported By: Fixed By: Coordinated By: 

Svg Image - Critical - Cross site scripting - SA-CONTRIB-2020-008

Biztonsági figyelmeztetések (contrib) - 2020. március 25. 19.05
Project: Svg ImageDate: 2020-March-25Security risk: Critical 15∕25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:AllVulnerability: Cross site scriptingDescription: 

SVG Image module allows to upload SVG files.

The module did not sufficiently protect against malicious code inside SVG files leading to a Cross Site Scripting vulnerability.

This vulnerability is mitigated by the fact that an attacker must have permission to upload an SVG file.

Solution: 

Install the latest version:

Also see the Svg Image project page.

Reported By: Fixed By: Coordinated By: