Security

Pages Restriction Access - Critical - Access bypass - SA-CONTRIB-2021-024

Pages Restriction Access - Critical - Access bypass - SA-CONTRIB-2021-024

Project: Pages Restriction Access
Date: 2021-July-28
Security risk: Critical 16∕25
Vulnerability: Access bypass

Description

This project enables administrators to restrict access from anonymous and regular users to pre-defined pages.

The administration routes used by the project lacked proper permissions, allowing untrusted users to access, create and modify the module's settings.

Solution

Install the latest version:

Read More

Form mode manager - Moderately critical - Access bypass - SA-CONTRIB-2021-023

Form mode manager - Moderately critical - Access bypass - SA-CONTRIB-2021-023

Project: Form mode manager
Date: 2021-July-21
Security risk: Moderately critical 11∕25
Vulnerability: Access bypass

Description

This module provides a user interface that allows the implementation and use of Form modes without custom development.

The module does not sufficiently respect access restrictions to entity forms for routes it creates to use specific form modes.

Read More

Drupal core - Critical - Drupal core - Critical - Third-party libraries - SA-CORE-2021-004

Drupal core - Critical - Drupal core - Critical - Third-party libraries - SA-CORE-2021-004

Project: Drupal core
Date: 2021-July-21
Security risk: Critical 15∕25
Vulnerability: Drupal core - Critical - Third-party libraries
CVE IDs: CVE-2021-32610

Description

The Drupal project uses the pear Archive_Tar library, which has released a security update that impacts Drupal.

The vulnerability is mitigated by the fact that Drupal core's use of the Archive_Tar library is not vulnerable, as it does not permit symlinks.

Read More

Linky Revision UI - Moderately critical - Access bypass - SA-CONTRIB-2021-021

Linky Revision UI - Moderately critical - Access bypass - SA-CONTRIB-2021-021

Project: Linky Revision UI
Date: 2021-June-30
Security risk: Moderately critical 11∕25
Vulnerability: Access bypass

Description

This module provides a revision UI for Linky entities.

The module doesn't sufficiently respect access restrictions to certain entities when used in conjunction with specific modules.

This vulnerability is mitigated by the fact that an attacker must have a role with any of the permissions provided by Linky Revision UI, and another affected module must be enabled.

Solution

Install the latest version:

Read More

UI redressing (clickjacking) vulnarabilities found in Opigno group manager and Opigno Learning path

UI redressing (clickjacking) vulnarabilities found in Opigno group manager and Opigno Learning path

Opigno Learning path - Less critical - UI redressing (clickjacking) - SA-CONTRIB-2021-018

Project: Opigno Learning path
Date: 2021-June-23
Security risk: Less critical 9∕25 
Vulnerability: UI redressing (clickjacking)

Description

This project is related to Opigno LMS distribution. It implements the learning path, that combines together in a very flexible way the different steps of a training in Opigno LMS.

Read More

Chaos Tool Suite (ctools) - Moderately critical - Access bypass - SA-CONTRIB-2021-015

Chaos Tool Suite (ctools) - Moderately critical - Access bypass - SA-CONTRIB-2021-015

Project: Chaos Tool Suite (ctools)
Date: 2021-June-16
Security risk: Moderately critical 13∕25 
Vulnerability: Access bypass

Description

Chaos tool suite (ctools) module provides a number of APIs and extensions for Drupal, its 8.x-3.x branch is a start from scratch to evaluate the features of ctools that didn't make it into Drupal Core 8.0.x and port them.

Read More

Linky Revision UI - Moderately critical - Access bypass - SA-CONTRIB-2021-016

Linky Revision UI - Moderately critical - Access bypass - SA-CONTRIB-2021-016

Project: Linky Revision UI
Date: 2021-June-16
Security risk: Moderately critical 11∕25 
Vulnerability: Access bypass

Description

This module provides a revision UI to Linky entities.

The module doesn't sufficiently respect access restrictions to certain entities when used in conjunction with specific modules.

This vulnerability is mitigated by the fact that an attacker must have a role with any of the permissions provided by Linky Revision UI, and another affected module must be enabled.

Read More

Pages