Biztonsági figyelmeztetések

Tooltip - Moderately critical - Cross site scripting - SA-CONTRIB-2024-058

Biztonsági figyelmeztetések (contrib) - 2024. november 6. 17.28
Project: TooltipDate: 2024-November-06Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross site scriptingAffected versions: <1.1.2Description: 

This module enables you to add any HTML content you want in a tooltip displayed on mouse hover.

The module does not sufficiently escape the markup inserted in the tooltip block.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer blocks".

Solution: 

Install the latest version:

  • If you use the Tooltip module for Drupal 8.x, 9.x or 10.x, upgrade to Tooltip 1.1.2
Reported By: Fixed By: Coordinated By: 

Basic HTTP Authentication - Critical - Access bypass - SA-CONTRIB-2024-057

Biztonsági figyelmeztetések (contrib) - 2024. november 6. 17.17
Project: Basic HTTP AuthenticationDate: 2024-November-06Security risk: Critical 16 ∕ 25 AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Access bypassDescription: 

The module provides a possibility to restrict access to specific paths using
basic HTTP authentication, in addition to standard Drupal access checks.

In some cases, the module removes existing access checks from some paths, resulting in an access bypass vulnerability.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

OhDear Integration - Moderately critical - Access bypass - SA-CONTRIB-2024-056

Biztonsági figyelmeztetések (contrib) - 2024. október 30. 18.11
Project: OhDear IntegrationDate: 2024-October-30Security risk: Moderately critical 13 ∕ 25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Access bypassAffected versions: <2.0.4Description: 

Integrates your Drupal website with the Oh Dear monitoring app.

Cached data of monitoring results is accessible to non-logged in users when caching is enabled on the module.

This vulnerability is mitigated by the fact that it only affects sites where caching is enabled for OhDear report healthcheck endpoint. It is not enabled by default and there's no UI option to do it. It has to be done directly in the ohdear_integration.settings.yml.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Cookiebot + GTM - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-055

Biztonsági figyelmeztetések (contrib) - 2024. október 30. 18.07
Project: Cookiebot + GTMDate: 2024-October-30Security risk: Moderately critical 14 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingAffected versions: <1.0.18Description: 

This module makes it possible for you to integrate Cookiebot and Google Tag Manager in a fast and simple way.

The module doesn't sufficiently filter for malicious script leading to a persistent cross site scripting (XSS) vulnerability.

Solution: 

Install the latest version and review settings:

  1. If you use the Cookiebot + GTM module for Drupal, upgrade to Cookiebot + GTM 1.0.18
  2. Additionally, the new codebase adds validation and permission changes so admins should re-save the configuration form at /admin/config/cookiebot_gtm and confirm which roles have permission to configure the module at /admin/people/permissions.
Reported By: Fixed By: Coordinated By: 

Loft Data Grids - Moderately critical - Multiple vulnerabilities - SA-CONTRIB-2024-054

Biztonsági figyelmeztetések (contrib) - 2024. október 23. 17.47
Project: Loft Data GridsDate: 2024-October-23Security risk: Moderately critical 11 ∕ 25 AC:Complex/A:User/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Multiple vulnerabilitiesDescription: 

This module provides serialization formats for use by other modules.

The module includes a version of phpoffice/phpspreadsheet which has multiple known security vulnerabilities.

Solution: 

If you use the Loft Data Grids module for Drupal 7.x, install one of:

  • Loft Data Grids 7.x-2.7 - which removes support for the XLSX format, as the patched version requires PHP 8.
  • Loft Data Grids 7.x-3.0 - which includes XLSX support, by requiring PHP 8 and Composer installation. See the module's README-file for more information.
Reported By: Fixed By: Coordinated By: 

Smartling Connector - Less critical - Multiple vulnerabilities - SA-CONTRIB-2024-053

Biztonsági figyelmeztetések (contrib) - 2024. október 23. 17.45
Project: Smartling ConnectorDate: 2024-October-23Security risk: Less critical 9 ∕ 25 AC:Complex/A:Admin/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Multiple vulnerabilitiesDescription: 

Smartling module allows you to translate content in Drupal 7 using the Smartling Translation Management Platform.

The module includes an outdated version of the Guzzle package (guzzlehttp/guzzle 6.3.3), which has known security vulnerabilities.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Monster Menus - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-052

Biztonsági figyelmeztetések (contrib) - 2024. október 23. 17.45
Project: Monster MenusDate: 2024-October-23Security risk: Critical 19 ∕ 25 AC:Complex/A:None/CI:All/II:All/E:Theoretical/TD:AllVulnerability: Arbitrary PHP code executionAffected versions: <9.3.4 || >=9.4.0 <9.4.2Description: 

This module enables you to group nodes within pages that have a highly-granular, distributed permissions structure.

In certain cases the module doesn't sufficiently sanitize data before passing it to PHP's unserialize() function, which can result in arbitrary code execution.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Views SVG Animation - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-051

Biztonsági figyelmeztetések (contrib) - 2024. október 23. 17.45
Project: Views SVG AnimationDate: 2024-October-23Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross Site ScriptingAffected versions: <1.0.1Description: 

This module enables you to animate an SVG graphic by selecting certain rows in a view.

The module doesn't sufficiently sanitize the SVG file before embedding it into the html.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission to upload SVG files.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

SVG Embed - Moderately critical - Cross site scripting - SA-CONTRIB-2024-050

Biztonsági figyelmeztetések (contrib) - 2024. október 23. 14.09
Project: SVG EmbedDate: 2024-October-23Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross site scriptingAffected versions: <2.1.2Description: 

This module enables you to embed the content of an SVG file into the body html of a node and optionally allows to translate text contained within the image.

The module doesn't sufficiently sanitize the SVG file before embedding it into the html.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission to upload SVG files, and the permission to use a text format that includes the SVG embed filter.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Drupal core - Moderately critical - Improper error handling - SA-CORE-2024-002

Biztonsági figyelmeztetések (core) - 2024. október 16. 18.27
Project: Drupal coreDate: 2024-October-16Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:None/CI:None/II:All/E:Theoretical/TD:UncommonVulnerability: Improper error handlingAffected versions: >=10.0 < 10.2.10Description: 

Under certain uncommon site configurations, a bug in the CKEditor 5 module can cause some image uploads to move the entire webroot to a different location on the file system. This could be exploited by a malicious user to take down a site.

The issue is mitigated by the fact that several non-default site configurations must exist simultaneously for this to occur.

Solution: 

Install the latest version:

  • If you are using Drupal 10.2, update to Drupal 10.2.10.
  • Drupal 10.3 and above are not affected, nor is Drupal 7.

All versions of Drupal 10 prior to 10.2 are end-of-life and do not receive security coverage. (Drupal 8 and Drupal 9 have both reached end-of-life.)

This advisory is not covered by Drupal Steward.

Reported By: Fixed By: Coordinated By: 

wkhtmltopdf - Highly critical - Unsupported - SA-CONTRIB-2024-049

Biztonsági figyelmeztetések (contrib) - 2024. október 9. 18.40
Project: wkhtmltopdfDate: 2024-October-09Security risk: Highly critical 23 ∕ 25 AC:None/A:None/CI:All/II:All/E:Proof/TD:AllVulnerability: UnsupportedAffected versions: *Description: 

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#procedure---own-project---unsupported

Solution: 

If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#procedure---own-project---unsupported in full.

Gutenberg - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2024-048

Biztonsági figyelmeztetések (contrib) - 2024. október 9. 17.56
Project: GutenbergDate: 2024-October-09Security risk: Moderately critical 12 ∕ 25 AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross Site Request ForgeryAffected versions: <2.13.0 || >=3.0.0 <3.0.5Description: 

This module provides a new UI experience for node editing using the Gutenberg Editor library.

The module did not sufficiently protect some routes against a Cross Site Request Forgery attack.

This vulnerability is mitigated by the fact that the tricked user needs to have an active session with the "use gutenberg" permission.

Solution: 

Install the latest version:

  • If you use the Gutenberg module versions 8.x-2.x, upgrade to Gutenberg 8.x-2.13
  • If you use the Gutenberg module versions 3.0.x, upgrade to Gutenberg 3.0.5
Reported By: Fixed By: Coordinated By: 

Facets - Critical - Cross Site Scripting - SA-CONTRIB-2024-047

Biztonsági figyelmeztetések (contrib) - 2024. október 9. 17.54
Project: FacetsDate: 2024-October-09Security risk: Critical 15 ∕ 25 AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross Site ScriptingAffected versions: <2.0.9Description: 

This module enables you to to easily create and manage faceted search interfaces.

The module doesn't sufficiently filter for malicious script leading to a reflected cross site scripting (XSS) vulnerability.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Block permissions - Moderately critical - Access bypass - SA-CONTRIB-2024-046

Biztonsági figyelmeztetések (contrib) - 2024. október 9. 17.48
Project: Block permissionsDate: 2024-October-09Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Access bypassAffected versions: >=1.0.0 <1.2.0Description: 

This module enables you to manage blocks from specific modules in the specific themes.

The module doesn't sufficiently check permissions under the scenario when a block is added using the form "/admin/structure/block/add/{plugin_id}/{theme}" (route "block.admin_add"). The attacker can add the block to the theme where they can't manage blocks.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer blocks provided by [provider]".

Solution: 

Install the latest version:

  • If you use the block_permissions module for Drupal 8.x, upgrade to block_permissions version at least 8.x-1.2 or the more recent 8.x-1.3
Reported By: Fixed By: Coordinated By: 

Monster Menus - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-045

Biztonsági figyelmeztetések (contrib) - 2024. október 9. 17.48
Project: Monster MenusDate: 2024-October-09Security risk: Moderately critical 13 ∕ 25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Access bypass, Information DisclosureAffected versions: <9.3.2Description: 

This module enables you to group nodes within pages that have a highly-granular, distributed permissions structure.

A function which can be used by third-party code does not return valid data under certain rare circumstances. If the third-party code relies on this data to decide whether to grant access to content, it may grant more access than was intended.

This vulnerability is only present in sites that have custom code calling the mm_content_get_uids_in_group() function with a single UID of zero (0) in the second parameter.

Solution: 

Install the latest version:

  • If you use the monster_menus module for Drupal 7.x, upgrade to monster_menus 7.x-1.34.
  • If you use the monster_menus module version 9.3.x, upgrade to monster_menus 9.3.2.
  • If you use the monster_menus module version 9.4.0 or newer, no change is needed.
Reported By: Fixed By: Coordinated By: 

Persistent Login - Moderately critical - Access bypass - SA-CONTRIB-2024-044

Biztonsági figyelmeztetések (contrib) - 2024. október 2. 18.27
Project: Persistent LoginDate: 2024-October-02Security risk: Moderately critical 11 ∕ 25 AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Access bypassAffected versions: <1.8.0 || >=2.2.0 <2.2.2 || 2.0.* || 2.1.*Description: 

This module enables users to remain logged in separately from session timeouts.

The module doesn't sufficiently check a user's disabled status when validating cookies.

This vulnerability is mitigated by the fact that an attacker must have an unexpired cookie from a previous successful login.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Two-factor Authentication (TFA) - Critical - Access bypass - SA-CONTRIB-2024-043

Biztonsági figyelmeztetések (contrib) - 2024. október 2. 18.20
Project: Two-factor Authentication (TFA)Date: 2024-October-02Security risk: Critical 15 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Access bypassAffected versions: <1.8.0Description: 

This module enables you to allow and/or require users to use a second authentication method in addition to password authentication.

The module does not sufficiently migrate sessions before prompting for a second factor token.

This vulnerability is mitigated by the fact that an attacker must fixate a session on a victim system that is then authenticated with username and password without completing Two Factor authentication. An attacker must gather additional information regarding the entry form after authentication. An attacker must still present a valid token to complete authentication.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

Diff - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-042

Biztonsági figyelmeztetések (contrib) - 2024. október 2. 18.15
Project: DiffDate: 2024-October-02Security risk: Moderately critical 11 ∕ 25 AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Access bypass, Information DisclosureAffected versions: <1.8.0 || >=2.0.0 <2.0.0-beta3Description: 

This module adds a tab for sufficiently permissioned users. The tab shows all revisions like standard Drupal but it also allows pretty viewing of all added/changed/deleted words between revisions.

The module doesn't sufficiently check revision access before rendering a diff report for 1) nodes or 2) general entities that support diff.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission from the general node permission to "view all revisions", one of the more specific node type permissions, "view %bundle revisions" or the equivalent for other general entity types.

Solution: 

Install the latest version:

  • If you use the Diff module for Drupal, upgrade to Diff 8.x-1.8
Reported By: Fixed By: Coordinated By: 

Smart IP Ban - Critical - Access bypass - SA-CONTRIB-2024-041

Biztonsági figyelmeztetések (contrib) - 2024. szeptember 18. 18.18
Project: Smart IP BanDate: 2024-September-18Security risk: Critical 18 ∕ 25 AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Access bypassDescription: 

The Smart IP Ban module enables a site to automatically ban an IP address based upon too many failed authentications.

The module doesn't sufficiently protect access to certain paths provided by the module allowing a malicious user to view and modify the settings.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: 

File Entity (fieldable files) - Moderately critical - Information Disclosure - SA-CONTRIB-2024-040

Biztonsági figyelmeztetések (contrib) - 2024. szeptember 11. 18.38
Project: File Entity (fieldable files)Date: 2024-September-11Security risk: Moderately critical 10 ∕ 25 AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Information DisclosureDescription: 

This module enables you to store and manage both private and public files, provides the ability to add fieldable metadata for file_entity bundle types in addition to core file_managed data.

The module doesn't sufficiently ensure private destination folders exist prior to writing to them. If the folder doesn't exist, the module places the file in a publicly accessible directory.

This vulnerability only affects sites with private files.

Solution: 

Install the latest version:

Reported By: Fixed By: Coordinated By: