The AltaGrade Blog

WordPress 5.7.2 Security Release

WordPress 5.7.2 Security Release

WordPress 5.7.2 is now available. This security release features one security fix. Because this is a security release, it is recommended that you update your sites immediately. All versions since WordPress 3.7 have also been updated.

WordPress 5.7.2 is a short-cycle security release. The next major release will be version 5.8. You can update to WordPress 5.7.2 by downloading from WordPress.org, or visit your Dashboard → Updates and click Update Now.

If you have sites that support automatic background updates, they’ve already started the update process.

Read More

Gutenberg - Critical - Access bypass - SA-CONTRIB-2021-007

Gutenberg - Critical - Access bypass - SA-CONTRIB-2021-007

Project: Gutenberg
Version: 8.x-2.x-dev, 8.x-1.x-dev
Date: 2021-May-12
Security risk: Critical 18∕25
Vulnerability: Access bypass

Description

This module provides a new UI experience for node editing using the Gutenberg Editor library.

The module did not correctly validate access rules in certain situations allowing anonymous users to delete blocks.

Solution

Install the latest version:

Read More

Facets - Moderately critical - Cross site scripting - SA-CONTRIB-2021-008

Facets - Moderately critical - Cross site scripting - SA-CONTRIB-2021-008

Project: Facets
Version: 8.x-1.x-dev
Date: 2021-May-12
Security risk: Moderately critical 11∕25
Vulnerability: Cross site scripting

Description

This module enables you to add customizable facets on search pages, from core search or searches provided by Search API.

The module doesn't sufficiently filter all output in certain circumstances.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer facets".

Read More

Chaos Tool Suite (ctools) - Moderately critical - Information disclosure - SA-CONTRIB-2021-009

Chaos Tool Suite (ctools) - Moderately critical - Information disclosure - SA-CONTRIB-2021-009

Project: Chaos Tool Suite (ctools)
Version: 8.x-3.5, 8.x-3.4, 8.x-3.3, 8.x-3.2, 8.x-3.1, 8.x-3.0
Date: 2021-May-12
Security risk: Moderately critical 12∕25
Vulnerability: Information disclosure

Description

Chaos tool suite (ctools) module provides a number of APIs and extensions for Drupal, it's 8.x-3.x branch is a start from scratch to evaluate the features of ctools that didn't make it into Drupal Core 8.0.x and port them.

Read More

Backdrop core - Critical - Cross-site scripting - SA-CORE-2021-002

Backdrop core - Critical - Cross-site scripting - SA-CORE-2021-002

Date: Wednesday, Apr 21th, 2021
Security risk: Critical
Advisory ID: BACKDROP-SA-CORE-2021-002
Vulnerability: Cross Site Scripting

Versions affected

  1. Backdrop Core 1.18.x versions prior to 1.18.3,
  2. Backdrop Core 1.17.x versions prior to 1.17.7
  3. Backdrop versions 1.16 and prior do not receive security coverage.

Description

Backdrop core's sanitization API fails to properly filter cross-site scripting under certain circumstances.

Read More

Drupal core - Critical - Cross-site scripting - SA-CORE-2021-002

Drupal core - Critical - Cross-site scripting - SA-CORE-2021-002

Project: Drupal core
Date: 2021-April-21
Security risk: Critical 15∕25
Vulnerability: Cross-site scripting

Description

Drupal core's sanitization API fails to properly filter cross-site scripting under certain circumstances.

Not all sites and users are affected, but configuration changes to prevent the exploit might be impractical and will vary between sites. Therefore, we recommend all sites update to this release as soon as possible.

Solution

Install the latest version:

Read More

Joomla Core - Escape xss in logo parameter error pages

Joomla Core - Escape xss in logo parameter error pages

Impact: Low
Severity: Low
Versions: 3.0.0 - 3.9.25
Exploit type: XSS
Reported Date: 2021-03-09
Fixed Date: 2021-04-13
CVE Number: CVE-2021-26030

Description

Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error pages.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.9.25

Solution

Upgrade to version 3.9.26

Read More

Pages