Drupal core - Less critical - Gadget chain - SA-CORE-2024-006

Date: 
2024-November-20
CVE IDs: 
CVE-2024-55636

Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Artbitrary File Deletion. It is not directly exploitable.

This issue is mitigated by the fact that in order to be exploitable, a separate vulnerability must be present that allows an attacker to pass unsafe input to unserialize(). There are no such known exploits in Drupal core.

Drupal core - Critical - Cross Site Scripting - SA-CORE-2024-005

Date: 
2024-November-20
CVE IDs: 
CVE-2024-55635

Drupal 7 core's Overlay module doesn't safely handle user input, leading to reflected cross-site scripting under certain circumstances.

Only sites with the Overlay module enabled are affected by this vulnerability.

Drupal core - Moderately critical - Access bypass - SA-CORE-2024-004

Date: 
2024-November-20
CVE IDs: 
CVE-2024-55634

Drupal's uniqueness checking for certain user fields is inconsistent depending on the database engine and its collation.

As a result, a user may be able to register with the same email address as another user.

This may lead to data integrity issues.

Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2024-003

Date: 
2024-November-20
CVE IDs: 
CVE-2024-12393

Drupal uses JavaScript to render status messages in some cases and configurations. In certain situations, the status messages are not adequately sanitized.

Node export - Moderately critical - Arbitrary PHP code execution - SA-CONTRIB-2024-061

Date: 
2024-November-20
CVE IDs: 
CVE-2024-13295

This module allows users to export nodes and then import it into another Drupal installation, or on the same site.

In certain cases the module doesn't sufficiently sanitize data before passing it to PHP's unserialize() function, which could results in Remote Code Execution via PHP Object Injection.

This vulnerability is mitigated by the fact that an attack must operate with the permission "Use PHP to import nodes", however this could be the case if this issue were combined with others in an "attack chain".

POST File - Critical - Cross Site Scripting, Arbitrary PHP code execution - SA-CONTRIB-2024-060

Date: 
2024-November-13
CVE IDs: 
CVE-2024-13294

The module creates an endpoint on the site at /postfile/upload that accepts a POST request for uploading a single file into a specified file system (public, private, etc).

This module accepts any uploaded file extension, including dangerous file formats so it can be used to bypass the allow_insecure_uploads config.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "postfile upload".

POST File - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2024-059

Date: 
2024-November-13
CVE IDs: 
CVE-2024-13293

The module creates an endpoint on the site at /postfile/upload that accepts a POST request for uploading a single file into a specified file system (public, private, etc).

The module doesn't sufficiently protect against Cross Site Request Forgery
under allowing an attacker to trick a site user into uploading a file.

Tooltip - Moderately critical - Cross site scripting - SA-CONTRIB-2024-058

Date: 
2024-November-06
CVE IDs: 
CVE-2024-13292

This module enables you to add any HTML content you want in a tooltip displayed on mouse hover.

The module does not sufficiently escape the markup inserted in the tooltip block.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer blocks".

Basic HTTP Authentication - Critical - Access bypass - SA-CONTRIB-2024-057

Date: 
2024-November-06
CVE IDs: 
CVE-2024-13291

The module provides a possibility to restrict access to specific paths using
basic HTTP authentication, in addition to standard Drupal access checks.

In some cases, the module removes existing access checks from some paths, resulting in an access bypass vulnerability.

OhDear Integration - Moderately critical - Access bypass - SA-CONTRIB-2024-056

Date: 
2024-October-30
CVE IDs: 
CVE-2024-13290

Integrates your Drupal website with the Oh Dear monitoring app.

Cached data of monitoring results is accessible to non-logged in users when caching is enabled on the module.

This vulnerability is mitigated by the fact that it only affects sites where caching is enabled for OhDear report healthcheck endpoint. It is not enabled by default and there's no UI option to do it. It has to be done directly in the ohdear_integration.settings.yml.

Pages

Subscribe with RSS Subscribe to Security advisories