Newsfeed-Generator
Drupal CMS Launch Party
Drupal CMS Launch Party @ 1xINTERNET office
Seelenberger Str. 2
60489 Frankfurt
2025.01.15 >=17:00
*** English version below ***
Die Drupal User Group Rhein-Main feiert einen Meilenstein der Webentwicklung: Den Launch von Drupal CMS!
»Drupal CMS« – das gibt es doch schon seit 25 Jahren? … Oder?
Nicht ganz! Drupal Core ist eigentlich ein Content-Management-Framework, das zwar auch als Grundlage für ein CMS dienen kann, aber im Kern sehr viel mehr bietet.
Das neue Drupal CMS (Projektname: Starshot) ist eine benutzerfreundliche, vorgefertigte Version von Drupal. Es punktet mit smarten Standardeinstellungen und einer intuitiven Benutzeroberfläche – ideal für schnelleres Site-Building und einen nahtlosen Einstieg. Im Gegensatz dazu ist Drupal Core die minimalistische, flexible Basisplattform, die Entwickler*innen maximale Anpassungsmöglichkeiten bietet, jedoch keine vorkonfigurierten Features oder Designs mitbringt.
Am 15. Januar 2025 ab 17:00 Uhr laden wir euch zu einem inspirierenden Abend ein, an dem Innovation, Networking und Austausch im Mittelpunkt stehen. Gemeinsam tauchen wir in die Erfolgsgeschichte eines der weltweit leistungsstärksten Content-Management-Systeme ein und feiern das neue Produkt.
Trefft Gleichgesinnte, teilt eure Erfahrungen und stoßt mit uns an auf eine Plattform, die die Art und Weise, wie wir das Web gestalten, revolutioniert hat. Dieser Abend bietet die perfekte Gelegenheit, Neues zu lernen, Ideen auszutauschen und Teil einer inspirierenden Community zu sein – oder zu werden.
Verpasst nicht diesen besonderen Moment in der Geschichte von Drupal.
Bitte melde Dich damit wir besser planen können.
The Drupal User Group Rhein-Main is celebrating a milestone in web development: The Launch of Drupal CMS!
»Drupal CMS« – isn't that around for like 25 years, is it?
Not quite! The well known Drupal core is more of a content management framework, which can serve as the base for a CMS, but at its heart has more to offer.
The new Drupal CMS (working title: Starshot) is a user-friendly, pre-configured version of Drupal. It stands out with smart defaults and an intuitive user interface - ideal for fast site building and a seamless start. Contrary, the Drupal Core is the minimalistic and flexible base platform that offers developers the full range of adaptability without pre-configured features.
On January 15th 2025 we invite you to an inspiring evening which centers around innovation, networking and exchange. Together we dive into the success story of one of the most powerful CMS and celebrate the new product.
Meet like-minded people, share your experiences and toast with us to a platform which revolutionised the way we design the web. This evening is the perfect opportunity to learn something new, exchange ideas, to be part of this wonderful community - or to become it.
Don't miss out on this special moment in history.
Please rsvp so we can plan ahead.
Drupal CMS Launch Party Munich
https://www.drupal.org/community/events/drupal-cms-launch-party-munich-2...
*** English version below ***
Die Drupal User Group München feiert einen Meilenstein der Webentwicklung: Den Launch von Drupal CMS!
»Drupal CMS« – das gibt es doch schon seit 25 Jahren? … Oder?
Nicht ganz! Drupal Core ist eigentlich ein Content-Management-Framework, das zwar auch als Grundlage für ein CMS dienen kann, aber im Kern sehr viel mehr bietet.
Das neue Drupal CMS (Projektname: Starshot) ist eine benutzerfreundliche, vorgefertigte Version von Drupal. Es punktet mit smarten Standardeinstellungen und einer intuitiven Benutzeroberfläche – ideal für schnelleres Site-Building und einen nahtlosen Einstieg. Im Gegensatz dazu ist Drupal Core die minimalistische, flexible Basisplattform, die Entwickler*innen maximale Anpassungsmöglichkeiten bietet, jedoch keine vorkonfigurierten Features oder Designs mitbringt.
Am 15. Januar 2025 ab 18:00 Uhr laden wir euch zu einem inspirierenden Abend ein, an dem Innovation, Networking und Austausch im Mittelpunkt stehen. Gemeinsam tauchen wir in die Erfolgsgeschichte eines der weltweit leistungsstärksten Content-Management-Systeme ein und feiern das neue Produkt.
Trefft Gleichgesinnte, teilt eure Erfahrungen und stoßt mit uns an auf eine Plattform, die die Art und Weise, wie wir das Web gestalten, revolutioniert hat. Dieser Abend bietet die perfekte Gelegenheit, Neues zu lernen, Ideen auszutauschen und Teil einer inspirierenden Community zu sein – oder zu werden.
Verpasst nicht diesen besonderen Moment in der Geschichte von Drupal.
Bitte melde Dich über LinkedIn oder Meetup an, damit wir besser planen können.
https://www.meetup.com/munchen-drupal-user-group-meetup/events/305146338
The Drupal User Group Munich is celebrating a milestone in web development: The Launch of Drupal CMS!
»Drupal CMS« – isn't that around for like 25 years, is it?
Not quite! The well known Drupal core is more of a content management framework, which can serve as the base for a CMS, but at its heart has more to offer.
The new Drupal CMS (working title: Starshot) is a user-friendly, pre-configured version of Drupal. It stands out with smart defaults and an intuitive user interface - ideal for fast site building and a seamless start. Contrary, the Drupal Core is the minimalistic and flexible base platform that offers developers the full range of adaptability without pre-configured features.
On January 15th 2025 we invite you to an inspiring evening which centers around innovation, networking and exchange. Together we dive into the success story of one of the most powerful CMS and celebrate the new product.
Meet like-minded people, share your experiences and toast with us to a platform which revolutionised the way we design the web. This evening is the perfect opportunity to learn something new, exchange ideas, to be part of this wonderful community - or to become it.
Don't miss out on this special moment in history.
Please rsvp at the meetup link so we can plan ahead.
https://www.meetup.com/munchen-drupal-user-group-meetup/events/305146338
Open Social - Moderately critical - Access bypass - SA-CONTRIB-2024-076
Open Social is a Drupal distribution for online communities, which ships with a default (optional) module social_file_private to ensure the images and files provided by the distribution are stored in the private instead of the public filesystem.
For installations of Open Social prior to version 11.8.0, after updating to 11.8.0 or higher, newly uploaded files were no longer stored in the private file system as intended. Instead, they were stored in the public file system.
Solution:Install the latest version and make sure to run the update hooks.
- If you use Open Social 12.3.x upgrade to Open Social 12.3.10
- If you use Open Social 12.4.x upgrade to Open Social 12.4.9
Note: If some files were uploaded during that time and became unused, the update hook cannot move them. These files will require manual cleanup. Read the module release notes linked above for advice on how to handle that situation.
Reported By: Fixed By: Coordinated By:- Greg Knaddison of the Drupal Security Team
Allow All File Extensions for file fields - Critical - Unsupported - SA-CONTRIB-2024-075
The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Solution:If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Git Utilities for Drupal - Critical - Unsupported - SA-CONTRIB-2024-074
The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Solution:If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Drupal Zurich Meetup & General Assembly, 12th of December 2024
https://www.meetup.com/drupal-switzerland/events/304454733
Join us on December 12 for the in-person Drupal Meetup at the Liip office in Zurich. Afterwards, we will go out to a Christmas market nearby for some drinks.
Doors open at 18:00, and presentations will start around 18:30. There will be time to network and exchange before, between, and after the talks.
Optionally, you can join the general assembly starting at 17:00
https://www.meetup.com/drupal-switzerland/events/304454746
The Drupal Meetup is dedicated to people interested in the Content Management System & Framework: Drupal.
We welcome everyone, from beginners to Drupal experts and people who just want to find out what Drupal is all about.
Come for the code, and stay for the community!
AGENDA
- The new web platform of "Museum für Gestaltung" - Challenges, Lessons learned and Opportunities for Digital presences of Cultural Institutions (Jon Minder, Josef Kruckenberg - Liip)
- Holcim Foundation Awards Platform - Case Study (Daniel Lemon - Amazee Labs)
LOCATION
Liip AG
Limmatstrasse 183
8005 Zürich
https://goo.gl/maps/PrC5VMGewo5jyQ4p9
Login Disable - Critical - Access bypass - SA-CONTRIB-2024-073
This module enables you to prevent existing users from logging in to your Drupal site unless they know the secret key to add to the end of the ?q=user login form page.
The Login Disable module does not correctly prevent a user with a disabled login from logging in, allowing those users to by-pass the protection offered by the module.
This vulnerability is mitigated by the fact that an attacker must already have a user account to log in. This bug therefore allows users to log in even if their login is disabled.
Solution:Install the latest version:
- If you use the Login Disable module for Drupal 9.x / 10.x, upgrade to Login Disable 2.1.1
The Drupal 7 version of the module is not affected.
Reported By: Fixed By: Coordinated By:- Ivo Van Geertruyen of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
- Benji Fisher of the Drupal Security Team
Browser Back Button - Moderately critical - Cross site scripting - SA-CONTRIB-2024-072
This module provides a block that renders a link providing the functionality of a browser's back button.
The module does not sufficiently escape text entered by an administrator, resulting in a cross scripting vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer blocks".
Solution:Install the latest version:
- If you use the Browser Back Button module for Drupal 9.x/10.x, upgrade to Browser Back Button 2.0.2
- Ivo Van Geertruyen of the Drupal Security Team
Entity Form Steps - Moderately critical - Cross site scripting - SA-CONTRIB-2024-071
This module allows a site builder to create multi-step entity forms leveraging the Field Group field type plugins.
The module doesn't escape plain text administrative configurations. An attacker with admin access could inject arbitrary JavaScript code.
This vulnerability is mitigated by the fact that an attacker must have a role with the 'administer [entity_type] form display' permission allowing access to configure entity form displays.
Solution:Install the latest version:
- If you use the Entity Form Steps module for Drupal 9.x/10.x, upgrade to Entity Form Steps 1.1.4
- Ivo Van Geertruyen of the Drupal Security Team
Minify JS - Moderately critical - Cross site request forgery - SA-CONTRIB-2024-070
The Minify JS module allows a site administrator to minify all javascript files that exist in the site's code base and use those minified files on the front end of the website.
Several administrator routes are unprotected against Cross-Site Request Forgery (CRSF) attacks.
Solution:Install the latest version:
- If you use the Minify JS module for Drupal 7.x, upgrade to Minify JS 7.x-1.11
- If you use the Minify JS module for Drupal 8.x, upgrade to Minify JS 3.0.3
- Ivo Van Geertruyen of the Drupal Security Team
- Scott Joudry
- Ivo Van Geertruyen of the Drupal Security Team
Download All Files - Critical - Access bypass - SA-CONTRIB-2024-069
This module provides a field formatter for the field type 'file' called `Table of files with download all link` .
The module had vulnerabilities allowing a user to download files they normally should not be able to download.
Solution:Install the latest version:
- If you use the Download All Files module, upgrade to 2.0.2 version
- Greg Knaddison of the Drupal Security Team
- Damien McKenna of the Drupal Security Team
- Ivo Van Geertruyen of the Drupal Security Team
Pages Restriction Access - Critical - Access bypass - SA-CONTRIB-2024-068
Module to restrict access from anonymous and regular users to configured pre-defined pages.
The module does not adequately handle protecting certain types of URLs.
Solution:Install the latest version:
- If you use the Pages Restriction Access for Drupal 8.x or higher, upgrade to Pages Restriction Access for Drupal 2.0.3
- Pierre Rudloff
- Ivo Van Geertruyen of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
- Damien McKenna of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- Ivo Van Geertruyen of the Drupal Security Team
OAuth & OpenID Connect Single Sign On – SSO (OAuth/OIDC Client) - Critical - Cross Site Scripting - SA-CONTRIB-2024-067
This module enables you to authenticate users through an Identity Provider (IdP) or OAuth Server, allowing them to log in to your Drupal site.
The module does not sufficiently escape query parameters sent to the callback URL when displaying error messages, particularly if the code parameter is missing in the response.
Solution:Install the latest version:
- If you use the OAuth & OpenID Connect Single Sign On – SSO (OAuth/OIDC Client) module 8.x-3.x for Drupal 9 and Drupal 10, upgrade to miniorange_oauth_client 8.x-3.44 .
- If you use the OAuth & OpenID Connect Single Sign On – SSO (OAuth/OIDC Client) module 4.x for Drupal 9, Drupal 10 and Drupal 11, upgrade to miniorange_oauth_client 4.0.19.
- If you use the OAuth & OpenID Connect Single Sign On – SSO (OAuth/OIDC Client) module 7.x-1.x for Drupal 7, upgrade to miniorange_oauth_client 7.x-1.355.
- Borut Piletic
- singh_ankit
- Ivo Van Geertruyen of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
- Damien McKenna of the Drupal Security Team
Print Anything - Critical - Unsupported - SA-CONTRIB-2024-066
The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Solution:If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Reported By:- Drew Webber of the Drupal Security Team
Megamenu Framework - Critical - Unsupported - SA-CONTRIB-2024-065
The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Solution:If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Reported By:- Drew Webber of the Drupal Security Team
Tarte au Citron - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-064
This module integrates Tarte au citron JS library with Drupal and prevent services to be loaded without user consent. Administrators can enable and configure services which will be managed by Tarte au citron.
When Google Tag Manager (GTM) service is enabled, an attacker can load a GTM container that can completely change the page or insert malicious JS.
This vulnerability is mitigated by the fact that the attacker must have a role with the permission "administer tarte au citron".
Solution:Install the latest version and confirm only trusted roles have the "Administer Tarte au citron" permission.
- If you use the Tarte au citron module for Drupal 10.x, upgrade to Tarte au citron 2.0.5
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- cilefen of the Drupal Security Team
Drupal User Group Berlin – December 2024
[EN version below]
Eines steht schon vor dem Drupal User Group-Treffen dieses Monats fest: Wenn ihr dieses Mal nach dem Meeting nach Hause kommt, müsst ihr eure Stiefel putzen, denn der Nikolaus bringt euch in dieser Nacht vielleicht Süßigkeiten nach Hause.
Feiern wir Weihnachten und lassen wir dieses Drupal Jahr bei einem schönen und gemütlichen Lean Coffee Lean Glühwein ausklingen. Das heißt: Wir bringen den Glühwein und wer mag, bringt ein paar Snacks mit und dann stimmen wir über die Themen ab, die uns am meisten interessieren.
Wenn es bereits ein Thema gibt, über das Du schon lange sprechen oder mehr erfahren wolltest, schreib einem von uns eine Direktnachricht auf Drupal Slack, damit wir vielleicht etwas auf die Beine stellen können, um sicherzustellen, dass es auf jeden Fall besprochen wird.
Wie immer findet ihr uns am ersten Donnerstag im Monat, diesen Monat ist das der 5. Dezember um 19:30, in der c-base (Rungestraße 20, 10179 Berlin).
Bis denne
Andreas (@akoe), Ariane (@odras), Florian (@stolzenhain) und Norman (@leymannx)
One thing's for sure already, even before this month's Drupal User Group meeting: When you come home this time from the meeting, you need to clean your boots because St. Nicholas might leave some sweets for you this night.
Let's celebrate Christmas time and wrap up this year of Drupal with a nice and cozy Lean Coffee Lean Gluhwein. That means: We bring some Gluhwein and you are invited to bring some snacks and we spontaneously decide what we want to talk about that evening.
If there's already one topic you wanted to talk or learn about for a long time, write one of us a direct message on Drupal Slack so we might be able to set something up to ensure to have that topic covered by any means.
As always you'll find us on the first Thursday a month, this month that's Dec. 5th at 19:30, at the c-base (Rungestraße 20, 10179 Berlin).
See you around
Andreas (@akoe), Ariane (@odras), Florian (@stolzenhain) and Norman (@leymannx)
Eloqua - Moderately critical - Arbitrary PHP code execution - SA-CONTRIB-2024-063
This module integrates webforms with eloqua, an automated marketing and demand generation software built to improve the quality and quantity of customers' sales leads and streamline their sales processes.
In certain cases the module doesn't sufficiently sanitize data before passing it to PHP's unserialize() function, which could result in Remote Code Execution via PHP Object Injection.
This vulnerability is mitigated by the fact that an attack must operate with the permission "access administration pages", however this could be the case if this issue were combined with others in an "attack chain".
Solution:Install the latest version:
- If you use the Eloqua module for Drupal 7.x, upgrade to Eloqua 7.x-1.15
- Drew Webber of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
Mailjet - Moderately critical - Arbitrary PHP code execution - SA-CONTRIB-2024-062
This module for Drupal provides complete control of Email settings with Drupal and Mailjet.
In certain cases the module doesn't securely pass data to PHP's unserialize() function, which could result in Remote Code Execution via PHP Object Injection.
This vulnerability is mitigated by the fact that an attack must operate with the permission "administer mailjet module", however this could be the case if this issue were combined with others in an "attack chain".
Solution:Install the latest version:
- Upgrade to Mailjet 4.0.1
- For Drupal 7.x, upgrade to Mailjet 7.x-2.23
- Drew Webber of the Drupal Security Team
- Drew Webber of the Drupal Security Team
- Bohdan Artemchuk
- Drew Webber of the Drupal Security Team
Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-008
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable.
This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to unserialize(). There are no such known exploits in Drupal core.
To help protect against this potential vulnerability, some additional checks have been added to Drupal core's database code. If you use a third-party database driver, check the release notes for additional configuration steps that may be required in certain cases.
Solution:Install the latest version:
- If you are using Drupal 7, update to Drupal 7.102.
- If you are using Drupal 10.2, update to Drupal 10.2.11.
- If you are using Drupal 10.3, update to Drupal 10.3.9.
All versions of Drupal 10 prior to 10.2 are end-of-life and do not receive security coverage. (Drupal 8 and Drupal 9 have both reached end-of-life.)
Reported By:- Drew Webber of the Drupal Security Team
- Drew Webber of the Drupal Security Team
- Fabian Franz
- Juraj Nemec of the Drupal Security Team
- Lee Rowlands of the Drupal Security Team
- Dave Long of the Drupal Security Team
- Alex Pott of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- Benji Fisher of the Drupal Security Team
- xjm of the Drupal Security Team
Neue Kommentare
vor 2 Tagen 4 Stunden
vor 3 Tagen 3 Stunden
vor 4 Tagen 22 Stunden
vor 5 Tagen 3 Stunden
vor 5 Tagen 6 Stunden
vor 5 Tagen 17 Stunden
vor 5 Tagen 20 Stunden
vor 5 Tagen 20 Stunden
vor 5 Tagen 20 Stunden
vor 5 Tagen 20 Stunden