Drupal Contrib Security
OhDear Integration - Moderately critical - Access bypass - SA-CONTRIB-2024-056
Integrates your Drupal website with the Oh Dear monitoring app.
Cached data of monitoring results is accessible to non-logged in users when caching is enabled on the module.
This vulnerability is mitigated by the fact that it only affects sites where caching is enabled for OhDear report healthcheck endpoint. It is not enabled by default and there's no UI option to do it. It has to be done directly in the ohdear_integration.settings.yml.
Solution:Install the latest version:
- If you use the OhDear Integration module, upgrade to 2.0.4 version.
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Cookiebot + GTM - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-055
This module makes it possible for you to integrate Cookiebot and Google Tag Manager in a fast and simple way.
The module doesn't sufficiently filter for malicious script leading to a persistent cross site scripting (XSS) vulnerability.
Solution:Install the latest version and review settings:
- If you use the Cookiebot + GTM module for Drupal, upgrade to Cookiebot + GTM 1.0.18
- Additionally, the new codebase adds validation and permission changes so admins should re-save the configuration form at /admin/config/cookiebot_gtm and confirm which roles have permission to configure the module at /admin/people/permissions.
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- Cathy Theys of the Drupal Security Team
Loft Data Grids - Moderately critical - Multiple vulnerabilities - SA-CONTRIB-2024-054
This module provides serialization formats for use by other modules.
The module includes a version of phpoffice/phpspreadsheet which has multiple known security vulnerabilities.
Solution:If you use the Loft Data Grids module for Drupal 7.x, install one of:
- Loft Data Grids 7.x-2.7 - which removes support for the XLSX format, as the patched version requires PHP 8.
- Loft Data Grids 7.x-3.0 - which includes XLSX support, by requiring PHP 8 and Composer installation. See the module's README-file for more information.
- Juraj Nemec of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- Ivo Van Geertruyen of the Drupal Security Team
Smartling Connector - Less critical - Multiple vulnerabilities - SA-CONTRIB-2024-053
Smartling module allows you to translate content in Drupal 7 using the Smartling Translation Management Platform.
The module includes an outdated version of the Guzzle package (guzzlehttp/guzzle 6.3.3), which has known security vulnerabilities.
Solution:Install the latest version:
- If you use Smartling module for Drupal 7.x-4.x, upgrade to smartling 7.x-4.19
- If you use Smartling module for Drupal 7.x-3.x, upgrade to smartling 7.x-3.8
- Juraj Nemec of the Drupal Security Team
Monster Menus - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-052
This module enables you to group nodes within pages that have a highly-granular, distributed permissions structure.
In certain cases the module doesn't sufficiently sanitize data before passing it to PHP's unserialize() function, which can result in arbitrary code execution.
Solution:Install the latest version:
- If you use Monster Menus branch 9.4.x, upgrade to monster_menus 9.4.2
- If you use Monster Menus branch 9.3.x, upgrade to monster_menus 9.3.4
- Drew Webber of the Drupal Security Team
- Drew Webber of the Drupal Security Team
- Dan Wilga
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- Drew Webber of the Drupal Security Team
Views SVG Animation - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-051
This module enables you to animate an SVG graphic by selecting certain rows in a view.
The module doesn't sufficiently sanitize the SVG file before embedding it into the html.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission to upload SVG files.
Solution:Install the latest version:
- If you use the views_svg_animation module for Drupal 10 or 11, upgrade to views_svg_animation 1.0.1
- Juraj Nemec of the Drupal Security Team
SVG Embed - Moderately critical - Cross site scripting - SA-CONTRIB-2024-050
This module enables you to embed the content of an SVG file into the body html of a node and optionally allows to translate text contained within the image.
The module doesn't sufficiently sanitize the SVG file before embedding it into the html.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission to upload SVG files, and the permission to use a text format that includes the SVG embed filter.
Solution:Install the latest version:
- If you use the svg_embed module for Drupal 7.x, upgrade to svg_embed 7.x-1.3
- If you use the svg_embed module for Drupal 10 or 11, upgrade to svg_embed 2.1.2
- Ivo Van Geertruyen of the Drupal Security Team
- Jürgen Haas
- Ivo Van Geertruyen of the Drupal Security Team
wkhtmltopdf - Highly critical - Unsupported - SA-CONTRIB-2024-049
The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Solution:If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Gutenberg - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2024-048
This module provides a new UI experience for node editing using the Gutenberg Editor library.
The module did not sufficiently protect some routes against a Cross Site Request Forgery attack.
This vulnerability is mitigated by the fact that the tricked user needs to have an active session with the "use gutenberg" permission.
Solution:Install the latest version:
- If you use the Gutenberg module versions 8.x-2.x, upgrade to Gutenberg 8.x-2.14
- If you use the Gutenberg module versions 3.0.x, upgrade to Gutenberg 3.0.5
- Mingsong
- Lee Rowlands of the Drupal Security Team
- Eirik Morland
- Stephan Zeidler
- Cathy Theys of the Drupal Security Team
- codebymikey
- Marco Fernandes
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Facets - Critical - Cross Site Scripting - SA-CONTRIB-2024-047
This module enables you to to easily create and manage faceted search interfaces.
The module doesn't sufficiently filter for malicious script leading to a reflected cross site scripting (XSS) vulnerability.
The vulnerability exists in the Facets Summary submodule. If you do not use that sub module your site is not vulnerable to this issue.
Edited October 9, 2024: clarified that Facets Summary is where the vulnerability is located
Solution:Install the latest version:
- If you use the Facets module, upgrade to Facets 2.0.9
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Block permissions - Moderately critical - Access bypass - SA-CONTRIB-2024-046
This module enables you to manage blocks from specific modules in the specific themes.
The module doesn't sufficiently check permissions under the scenario when a block is added using the form "/admin/structure/block/add/{plugin_id}/{theme}" (route "block.admin_add"). The attacker can add the block to the theme where they can't manage blocks.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer blocks provided by [provider]".
Solution:Install the latest version:
- If you use the block_permissions module for Drupal 8.x, upgrade to block_permissions version at least 8.x-1.2 or the more recent 8.x-1.3
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Monster Menus - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-045
This module enables you to group nodes within pages that have a highly-granular, distributed permissions structure.
A function which can be used by third-party code does not return valid data under certain rare circumstances. If the third-party code relies on this data to decide whether to grant access to content, it may grant more access than was intended.
This vulnerability is only present in sites that have custom code calling the mm_content_get_uids_in_group() function with a single UID of zero (0) in the second parameter.
Solution:Install the latest version:
- If you use the monster_menus module for Drupal 7.x, upgrade to monster_menus 7.x-1.34.
- If you use the monster_menus module version 9.3.x, upgrade to monster_menus 9.3.2.
- If you use the monster_menus module version 9.4.0 or newer, no change is needed.
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- Damien McKenna of the Drupal Security Team
Persistent Login - Moderately critical - Access bypass - SA-CONTRIB-2024-044
This module enables users to remain logged in separately from session timeouts.
The module doesn't sufficiently check a user's disabled status when validating cookies.
This vulnerability is mitigated by the fact that an attacker must have an unexpired cookie from a previous successful login.
Solution:Install the latest version:
- If you use the Persistent Login 8.x-1.x, upgrade to Persistent Login 8.x-1.8
- If you use the Persistent Login 2.x, upgrade to Persistent Login 2.2.2
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- Drew Webber of the Drupal Security Team
Two-factor Authentication (TFA) - Critical - Access bypass - SA-CONTRIB-2024-043
This module enables you to allow and/or require users to use a second authentication method in addition to password authentication.
The module does not sufficiently migrate sessions before prompting for a second factor token.
This vulnerability is mitigated by the fact that an attacker must fixate a session on a victim system that is then authenticated with username and password without completing Two Factor authentication. An attacker must gather additional information regarding the entry form after authentication. An attacker must still present a valid token to complete authentication.
Solution:Install the latest version:
- If you use the Two-factor Authentication (TFA) module for Drupal 8+ upgrade to Two-factor Authentication (TFA) 8.x-1.8
- If you use the Two-factor Authentication (TFA) module for Drupal 7 upgrade to Two-factor Authentication (TFA) 7.x-2.4
- Francesco Placella
- Juraj Nemec of the Drupal Security Team
- Conrad Lara
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Diff - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-042
This module adds a tab for sufficiently permissioned users. The tab shows all revisions like standard Drupal but it also allows pretty viewing of all added/changed/deleted words between revisions.
The module doesn't sufficiently check revision access before rendering a diff report for 1) nodes or 2) general entities that support diff.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission from the general node permission to "view all revisions", one of the more specific node type permissions, "view %bundle revisions" or the equivalent for other general entity types.
Solution:Install the latest version:
- If you use the Diff module for Drupal, upgrade to Diff 8.x-1.8
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Smart IP Ban - Critical - Access bypass - SA-CONTRIB-2024-041
The Smart IP Ban module enables a site to automatically ban an IP address based upon too many failed authentications.
The module doesn't sufficiently protect access to certain paths provided by the module allowing a malicious user to view and modify the settings.
Solution:Install the latest version:
- If you use the Smart IP Ban module for Drupal 7.x, upgrade to Smart IP Ban 7.x-1.1
- Greg Knaddison of the Drupal Security Team
- Damien McKenna of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
File Entity (fieldable files) - Moderately critical - Information Disclosure - SA-CONTRIB-2024-040
This module enables you to store and manage both private and public files, provides the ability to add fieldable metadata for file_entity bundle types in addition to core file_managed data.
The module doesn't sufficiently ensure that folders exist within the private destination prior to writing to them. If the subfolder doesn't exist, the module places the file in a publicly accessible directory.
This vulnerability only affects sites with private files.
Solution:Install the latest version:
- If you use the file_entity module for Drupal 7, upgrade to file_entity 7.x-2.39 or newer.
- Greg Knaddison of the Drupal Security Team
- Damien McKenna of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Security Kit - Less critical - Denial of Service - SA-CONTRIB-2024-039
This module provides Drupal with various security-hardening options, for example by emitting various configurable HTTP response headers.
The module doesn't sufficiently validate input in Content Security Policy (CSP) violation reports. This can cause errors when a logging module (e.g. dblog or syslog) attempts to parse the resulting log message which contains invalid data.
This vulnerability is mitigated by the fact that to be affected a site must have seckit's CSP reporting functionality enabled. Recent versions of Drupal 10 and 11 core are not vulnerable due to improved parsing of log messages.
Solution:Install the latest version:
- If you use the 7.x-1.x branch of the seckit module, upgrade to seckit 7.x-1.13
- If you use the 2.0.x branch of the seckit module, upgrade to seckit 2.0.3
- jweowu
- Drew Webber of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
- Drew Webber of the Drupal Security Team
- Heine Deelstra of the Drupal Security Team
Neue Kommentare
vor 7 Stunden 39 Minuten
vor 10 Stunden 29 Minuten
vor 11 Stunden 6 Minuten
vor 3 Tagen 11 Stunden
vor 4 Tagen 9 Stunden
vor 6 Tagen 4 Stunden
vor 6 Tagen 10 Stunden
vor 6 Tagen 12 Stunden
vor 1 Woche 17 Minuten
vor 1 Woche 2 Stunden