The AltaGrade Blog

Drupal 8 is now end-of-life - PSA-2021-11-30

Drupal 8 is now end-of-life - PSA-2021-11-30

Description

As of November 17, 2021, the Drupal core version 8 series has reached end-of-life. This means that all releases of Drupal 8 core (with 8.y.x version numbers) and Drupal contributed project releases that are compatible with only Drupal 8 will be marked unsupported as they no longer have security team support.

Drupal 8.0.0 was first released on November 9, 2015. The last version was released on November 17, 2021.

Read More

OpenID Connect Microsoft Azure Active Directory client - Moderately critical - Access Bypass - SA-CONTRIB-2021-044

OpenID Connect Microsoft Azure Active Directory client - Moderately critical - Access Bypass - SA-CONTRIB-2021-044

Project: OpenID Connect Microsoft Azure Active Directory client
Date: 2021-November-17
Security risk: Moderately critical 14∕25
Vulnerability: Access Bypass

Description

This module enables users to authenticate through their Microsoft Azure AD account.

The module does not sufficiently check authorization before updating user profile information in certain non-default configurations. This could lead a user being able to hijack another existing account.

Read More

Linkit - Moderately critical - Cross Site Scripting - SA-CONTRIB-2021-042

Linkit - Moderately critical - Cross Site Scripting - SA-CONTRIB-2021-042

Project: Linkit
Date: 2021-September-29
Security risk: Moderately critical 12∕25
Vulnerability: Cross Site Scripting

Description

Linkit provides an easy interface for internal and external linking with WYSIWYG editors by using an autocomplete field.

It does not sufficiently sanitize user input.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission to create or edit an entity bundle.

Solution

Install the latest version:

Read More

Domain Group - Critical - Access bypass - SA-CONTRIB-2021-037

Domain Group - Critical - Access bypass - SA-CONTRIB-2021-037

Project: Domain Group
Date: 2021-September-22
Security risk: Critical 18∕25
Vulnerability: Access bypass

Description

This module enables sites to define a domain from Domain Access that points directly to a group page.

The module doesn't sufficiently manage the access to content administrative paths allowing an attacker to see and take actions on content (nodes) they should be allowed to.

Solution

Install the latest version:

Read More

SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider - Moderately critical - Multiple vulnerabilities - SA-CONTRIB-2021-036

SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider - Moderately critical - Multiple vulnerabilities - SA-CONTRIB-2021-036

Project: SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider
Date: 2021-September-22
Security risk: Moderately critical 14∕25 
Vulnerability: Multiple vulnerabilities

Description

This module provides a solution to authenticate visitors using existing SAML providers.

Certain non-default configurations allow a malicious user to login as any chosen user.

Read More

Taxonomy Manager - Moderately critical - Access bypass - SA-CONTRIB-2021-035

Taxonomy Manager - Moderately critical - Access bypass - SA-CONTRIB-2021-035

Project: Taxonomy Manager
Date: 2021-September-22
Security risk: Moderately critical 10∕25
Vulnerability: Access bypass

Description

This module provides a powerful interface for managing a taxonomy vocabulary. A vocabulary gets displayed in a dynamic tree view, where parent terms can be expanded to list their nested child terms or can be collapsed.

The module does not take the correct user permissions into account, allowing an attacker to delete and move terms.

Read More

Search API attachments - Critical - Arbitrary PHP code execution - SA-CONTRIB-2021-034

Search API attachments - Critical - Arbitrary PHP code execution - SA-CONTRIB-2021-034

Project: Search API attachments
Date: 2021-September-22
Security risk: Critical 15∕25
Vulnerability: Arbitrary PHP code execution

Description

This module enables you to extract the textual content of files for use on a website, e.g. to display it or or use it in search indexes.

The module doesn't sufficiently protect the administrator-defined commands which are executed on the server, which leads to post-authentication remote code execution by a limited set of users.

Read More

Pages