Focal Point - Moderately critical - Cross site scripting - SA-CONTRIB-2019-015

Biztonsági figyelmeztetések (contrib) - 2019. február 13. 19.14
Project: Focal PointVersion: 7.x-1.17.x-1.0Date: 2019-February-13Security risk: Moderately critical 13∕25 AC:Complex/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross site scriptingDescription: 

This module enables a privileged user to specify the important part of an image for the purposes of cropping.

The module doesn't sufficiently sanitize certain form element attributes when the focal point widget is displayed on a form.

This vulnerability is mitigated by the fact that an attacker must have the ability to generate markup (e.g. with a field that accepts "filtered html") AND they must have permission to edit a node or entity whose add/edit form contains the focal point widget.


Install the latest version:

Also see the Focal Point project page.

Reported By: Fixed By: Coordinated By: 

Acquia Connector - Moderately critical - Access bypass - SA-CONTRIB-2019-014

Biztonsági figyelmeztetések (contrib) - 2019. február 6. 19.13
Project: Acquia ConnectorDate: 2019-February-06Security risk: Moderately critical 12∕25 AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassDescription: 

Acquia Connector facilitates sending certain telemetry data to Acquia for the purposes of analysis. The module automates the collection of site information to speed support communication and issue resolution. It is required for use with the Acquia Insight service.

The module does not properly enforce access control in a specific case, which can lead to disclosing information.

The vulnerability is mitigated by requiring the module diff feature to be enabled. This feature is enabled by default.


Install the latest version:

This vulnerability can be mitigated by unchecking Source code under Allow collection and examination of the following items on the Acquia Subscription settings (in Drupal 7) or Acquia Connector settings (in Drupal 8) page. The settings page is under Administration -> Configuration -> System.

For Drupal 7, this setting can also be disabled by setting the acquia_spi_module_diff_data variable to FALSE. Using Drush:

drush vset acquia_spi_module_diff_data FALSE

For Drupal 8, this setting can also be disabled by setting the spi.module_diff_data key within the acquia_connector.settings configuration setting to 0. Using Drush:

drush config-set acquia_connector.settings spi.module_diff_data 0

Also see the Acquia Connector project page.

Reported By: Fixed By: Coordinated By: 

Login Alert - Moderately critical - Access bypass - SA-CONTRIB-2019-013

Biztonsági figyelmeztetések (contrib) - 2019. február 6. 18.36
Project: Login AlertDate: 2019-February-06Security risk: Moderately critical 13∕25 AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:AllVulnerability: Access bypassDescription: 

This module provides a field on user profiles which allows users to get a notification when their account logs in to the site. The notification e-mail includes a link which will terminate all sessions for that user. This is useful in the case of unauthorised access to the account.

The module doesn't employ sufficient randomness in the generation of URLs, which represents an Access Bypass vulnerability.


Install the latest version:

Also see the Login Alert project page.

Reported By: Fixed By: Coordinated By: 

Public Download Count - Less critical - Open Redirect Vulnerability - SA-CONTRIB-2019-012

Biztonsági figyelmeztetések (contrib) - 2019. február 6. 18.22
Project: Public Download CountDate: 2019-February-06Security risk: Less critical 8∕25 AC:Basic/A:None/CI:None/II:None/E:Theoretical/TD:UncommonVulnerability: Open Redirect VulnerabilityDescription: 

This module enables you to track download counts of files linked from a Drupal site. Links in Drupal content are rewritten to go through an intermediate page that records download stats and then redirects to the final destination.

The module did not verify that the links provided to the intermediate page were actually present in the Drupal site content and did not contain checks to prevent external sites from accessing the counter.


Install the latest version:

Also see the Public Download Count project page.

Reported By: Fixed By: Coordinated By: