Hírolvasó

Open Social - Moderately critical - Access bypass - SA-CONTRIB-2022-062

Biztonsági figyelmeztetések (contrib) - 2022. november 30. 16.34
Project: Open SocialDate: 2022-November-30Security risk: Moderately critical 10∕25 AC:Basic/A:User/CI:None/II:Some/E:Theoretical/TD:DefaultVulnerability: Access bypassAffected versions: >=11.4.0 <11.4.9 || >=11.5.0 <11.5.1Description: 

Social Private Message module allows users on the platform to allow users to send private messages to each other.

The module does not properly perform the correct access checks for certain operations.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Open Social - Moderately critical - Access bypass - SA-CONTRIB-2022-061

Biztonsági figyelmeztetések (contrib) - 2022. november 30. 16.28
Project: Open SocialDate: 2022-November-30Security risk: Moderately critical 13∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Access bypassAffected versions: >=11.4.0 <11.4.9 || >=11.5.0 <11.5.1Description: 

Social Flexible Group is an Open Social extension that allows users to create groups with many different configurations.

In specific uncommon scenarios, where a platform doesn't have any flexible groups with the "Group members only (secret)" visibility, community groups are visible to anonymous users on the /all-groups page. No other group information is revealed since group access is not affected by this issue.

This vulnerability is mitigated by creating a Flexible Group with visibility "Group members only (secret)".

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Social Base - Moderately critical - Access bypass - SA-CONTRIB-2022-060

Biztonsági figyelmeztetések (contrib) - 2022. november 30. 16.20
Project: Social BaseDate: 2022-November-30Security risk: Moderately critical 14∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassAffected versions: >=2.3 <2.3.4 || >=2.4 <2.4.3Description: 

The Social Base theme is designed as a base theme for Open Social. This base
theme holds has a lot of sensible defaults. It doesn't however contain much
styling. We expect developers to want to change this for their own project.

When content within the Open Social distribution is placed within a group then the Socialbase theme renders a link to that group on the content view page.

The link to groups was rendered without sufficiently checking that the viewing user has access to the group. When creating public content in a non-public group this could lead to exposing the existence of the group and the group title to unauthorized users. The group itself remained inaccessible.

Solution: 

Install the latest version:

  • If you use the Socialbase module theme for Drupal 8.x/9.x, upgrade to Socialbase 2.4.3
  • If you use the Socialbase module theme for Drupal 8.x/9.x, upgrade to Socialbase 2.3.4
Reported By: Fixed By: Coordinated By: 

Search API - Moderately critical - Information Disclosure - SA-CONTRIB-2022-059

Biztonsági figyelmeztetések (contrib) - 2022. október 19. 22.28
Project: Search APIDate: 2022-October-19Security risk: Moderately critical 13∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Information DisclosureDescription: 

This module enables you to build searches using a wide range of features, data sources and backends.

The module doesn't in all cases correctly detect whether a given search is active on the current page, leading to potential information disclosure for some setups.

This vulnerability is mitigated by the fact that only very specific setups will have this problem and there is no way for an attacker to trigger it.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Twig Field Value - Moderately critical - Access bypass - SA-CONTRIB-2022-058

Biztonsági figyelmeztetések (contrib) - 2022. október 12. 21.41
Project: Twig Field ValueDate: 2022-October-12Security risk: Moderately critical 12∕25 AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassDescription: 

This module enables themers to get partial data from field render arrays. It gives them more control over the output without drilling deep into the render array or using preprocess functions.

The module doesn't sufficiently apply access restrictions when using the filters field_label, field_value, field_raw and field_target_entity.

This vulnerability is mitigated by the fact that these filters must be used in combination with either unpublished content or access control modules.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

S3 File System - Moderately critical - Access bypass - SA-CONTRIB-2022-057

Biztonsági figyelmeztetések (contrib) - 2022. szeptember 28. 18.29
Project: S3 File SystemDate: 2022-September-28Security risk: Moderately critical 10∕25 AC:Complex/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Access bypassDescription: 

This module enables you to utilize S3-compatible storage as a Drupal filesystem.

The module doesn't sufficiently prevent file access across multiple filesystem schemes stored in the same bucket.

This vulnerability is mitigated by the fact that an attacker must obtain a method to access arbitrary file paths, the site must have public or private takeover enabled, and the file metadata cache must be ignored.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Drupal core - Critical - Multiple vulnerabilities - SA-CORE-2022-016

Biztonsági figyelmeztetések (core) - 2022. szeptember 28. 18.24
Project: Drupal coreDate: 2022-September-28Security risk: Critical 18∕25 AC:Basic/A:Admin/CI:All/II:All/E:Proof/TD:AllVulnerability: Multiple vulnerabilitiesAffected versions: >= 8.0.0 <9.3.22 || >= 9.4.0 <9.4.7CVE IDs: CVE-2022-39261Description: 

Drupal uses the Twig third-party library for content templating and sanitization. Twig has released a security update that affects Drupal. Twig has rated the vulnerability as high severity.

Drupal core's code extending Twig has also been updated to mitigate a related vulnerability.

Multiple vulnerabilities are possible if an untrusted user has access to write Twig code, including potential unauthorized read access to private files, the contents of other files on the server, or database credentials.

The vulnerability is mitigated by the fact that an exploit is only possible in Drupal core with a restricted access administrative permission. Additional exploit paths for the same vulnerability may exist with contributed or custom code that allows users to write Twig templates.

Solution: 

Install the latest version:

All versions of Drupal 9 prior to 9.3.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.

Drupal 7 core does not include Twig and therefore is not affected.

Reported By: Fixed By: 

Permissions by Term - Moderately critical - Access bypass - SA-CONTRIB-2022-056

Biztonsági figyelmeztetések (contrib) - 2022. szeptember 7. 19.06
Project: Permissions by TermVersion: 3.1.18Date: 2022-September-07Security risk: Moderately critical 14∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassDescription: 

This module enables you to set content permissions based on taxonomy terms.

The module doesn't sufficiently restrict access to translated and unpublished nodes.

This vulnerability is mitigated by the fact that it only affects sites with translated content.

Solution: 

Install the latest version:

  • If you use the Permissions by Term module for Drupal 9.x, upgrade to version 3.1.19
Reported By: Fixed By: Coordinated By: 

Permissions by Term - Moderately critical - Access bypass - SA-CONTRIB-2022-055

Biztonsági figyelmeztetések (contrib) - 2022. szeptember 7. 19.04
Project: Permissions by TermVersion: 3.1.173.1.163.1.153.1.143.1.133.1.123.1.113.1.103.1.93.1.83.1.73.1.63.1.53.1.43.1.33.1.23.1.13.1.03.0.13.0.0Date: 2022-September-07Security risk: Moderately critical 14∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassDescription: 

This module enables you to restrict content via taxonomy terms and related permissions.

The module doesn't sufficiently restrict cached content in certain circumstances.

This vulnerability is mitigated by the fact that it only occurs when multiple entity types are enabled in the module.

Solution: 

Install the latest version:

  • If you use the Permissions by Term module for Drupal 9.x, upgrade to version 3.1.19
Reported By: Fixed By: Coordinated By: 

Next.js - Moderately critical - Access bypass - SA-CONTRIB-2022-054

Biztonsági figyelmeztetések (contrib) - 2022. szeptember 7. 18.57
Project: Next.jsVersion: 1.2.01.1.01.0.0Date: 2022-September-07Security risk: Moderately critical 12∕25 AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassDescription: 

The Next.js module provides an inline preview for content. Authenticated requests are made to Drupal to fetch JSON:API content and render them in an iframe from the decoupled Next.js site.

The current implementation doesn’t sufficiently check access for fetching data. All requests made to Drupal are authenticated using a single scope with elevated content access. Users without access to content could be exposed to unauthorized content.

Solution: 

If you use the Next.js module for Drupal 9.x:

  1. Upgrade to version v1.3.0.
  2. Edit the Next.js user and assign all roles that can be used as scopes. The granted roles will be filtered based on roles assigned to the current user.

See the upgrade guide at https://next-drupal.org/docs/upgrade-guide.

Reported By: Fixed By: Coordinated By: 

Commerce Elavon - Moderately critical - Access bypass - SA-CONTRIB-2022-053

Biztonsági figyelmeztetések (contrib) - 2022. augusztus 24. 20.21
Project: Commerce ElavonVersion: 8.x-2.28.x-2.18.x-2.08.x-2.0-beta28.x-2.0-beta17.x-1.47.x-1.37.x-1.27.x-1.17.x-1.0Date: 2022-August-24Security risk: Moderately critical 11∕25 AC:Complex/A:None/CI:None/II:Some/E:Theoretical/TD:DefaultVulnerability: Access bypassAffected versions: <=2.2.0Description: 

This module enables you to accept payments from the Elavon payment provider.

The module doesn't sufficiently verify that it's communicating with the correct server when using the Elavon (On-site) payment gateway, which could lead to leaking valid payment details as well as accepting invalid payment details.

This vulnerability is mitigated by the fact that an attacker must be able to spoof the Elavon DNS received by your site.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: