The AltaGrade Blog

Form mode manager - Moderately critical - Access bypass - SA-CONTRIB-2021-023

Form mode manager - Moderately critical - Access bypass - SA-CONTRIB-2021-023

Project: Form mode manager
Date: 2021-July-21
Security risk: Moderately critical 11∕25
Vulnerability: Access bypass

Description

This module provides a user interface that allows the implementation and use of Form modes without custom development.

The module does not sufficiently respect access restrictions to entity forms for routes it creates to use specific form modes.

Read More

Drupal core - Critical - Drupal core - Critical - Third-party libraries - SA-CORE-2021-004

Drupal core - Critical - Drupal core - Critical - Third-party libraries - SA-CORE-2021-004

Project: Drupal core
Date: 2021-July-21
Security risk: Critical 15∕25
Vulnerability: Drupal core - Critical - Third-party libraries
CVE IDs: CVE-2021-32610

Description

The Drupal project uses the pear Archive_Tar library, which has released a security update that impacts Drupal.

The vulnerability is mitigated by the fact that Drupal core's use of the Archive_Tar library is not vulnerable, as it does not permit symlinks.

Read More

WordPress 5.8 Tatum has been released

WordPress 5.8 Tatum has been released

Introducing 5.8 “Tatum”, our latest and greatest release now available for download or update in your dashboard. Named in honor of Art Tatum, the legendary Jazz pianist. His formidable technique and willingness to push boundaries inspired musicians and changed what people thought could be done.

So fire up your music service of choice and enjoy Tatum’s famous recordings of ‘Tea for Two’, ‘Tiger Rag’, ‘Begin the Beguine’, and ‘Night and Day’ as you read about what the latest WordPress version brings to you.

Read More

Linky Revision UI - Moderately critical - Access bypass - SA-CONTRIB-2021-021

Linky Revision UI - Moderately critical - Access bypass - SA-CONTRIB-2021-021

Project: Linky Revision UI
Date: 2021-June-30
Security risk: Moderately critical 11∕25
Vulnerability: Access bypass

Description

This module provides a revision UI for Linky entities.

The module doesn't sufficiently respect access restrictions to certain entities when used in conjunction with specific modules.

This vulnerability is mitigated by the fact that an attacker must have a role with any of the permissions provided by Linky Revision UI, and another affected module must be enabled.

Solution

Install the latest version:

Read More

UI redressing (clickjacking) vulnarabilities found in Opigno group manager and Opigno Learning path

UI redressing (clickjacking) vulnarabilities found in Opigno group manager and Opigno Learning path

Opigno Learning path - Less critical - UI redressing (clickjacking) - SA-CONTRIB-2021-018

Project: Opigno Learning path
Date: 2021-June-23
Security risk: Less critical 9∕25 
Vulnerability: UI redressing (clickjacking)

Description

This project is related to Opigno LMS distribution. It implements the learning path, that combines together in a very flexible way the different steps of a training in Opigno LMS.

Read More

Chaos Tool Suite (ctools) - Moderately critical - Access bypass - SA-CONTRIB-2021-015

Chaos Tool Suite (ctools) - Moderately critical - Access bypass - SA-CONTRIB-2021-015

Project: Chaos Tool Suite (ctools)
Date: 2021-June-16
Security risk: Moderately critical 13∕25 
Vulnerability: Access bypass

Description

Chaos tool suite (ctools) module provides a number of APIs and extensions for Drupal, its 8.x-3.x branch is a start from scratch to evaluate the features of ctools that didn't make it into Drupal Core 8.0.x and port them.

Read More

Linky Revision UI - Moderately critical - Access bypass - SA-CONTRIB-2021-016

Linky Revision UI - Moderately critical - Access bypass - SA-CONTRIB-2021-016

Project: Linky Revision UI
Date: 2021-June-16
Security risk: Moderately critical 11∕25 
Vulnerability: Access bypass

Description

This module provides a revision UI to Linky entities.

The module doesn't sufficiently respect access restrictions to certain entities when used in conjunction with specific modules.

This vulnerability is mitigated by the fact that an attacker must have a role with any of the permissions provided by Linky Revision UI, and another affected module must be enabled.

Read More

Pages