Node Access Rebuild Progressive - Less critical - Access bypass - SA-CONTRIB-2024-010

Date: 
2024-February-21
CVE IDs: 
CVE-2024-13246

This module provides an alternative mean of rebuilding the Content Access table.

The module doesn't sufficiently reset the state of content access when the module is uninstalled.

CKEditor 4 LTS - WYSIWYG HTML editor - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-009

Date: 
2024-February-14
CVE IDs: 
CVE-2024-13245

The CKEditor 4 LTS - WYSIWYG HTML editor module uses the CKEditor library for WYSIWYG editing. CKEditor has released a security update that on certain configurations may impact the Drupal module that bundles and integrates this code.

The vulnerability is mitigated by the fact it requires:

Migrate Tools - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2024-008

Date: 
2024-February-07
CVE IDs: 
CVE-2024-13244

The Migrate Tools module provides tools for running and managing Drupal migrations.

The module doesn't sufficiently protect against Cross Site Request Forgery under specific scenarios allowing an attacker to trick an authenticated administrator into initiating a migration.

This vulnerability is mitigated by the fact that an attacker must know the name of the migration.

Entity Delete Log - Moderately critical - Access bypass - SA-CONTRIB-2024-007

Date: 
2024-January-31
CVE IDs: 
CVE-2024-13243

The Entity Delete Log module tracks the deletion of configured entity types, such as node or comments.

It does not add sufficient permission to the log report page, allowing an attacker to view information from deleted entities.

Swift Mailer (abandoned) - Moderately critical - Access bypass - SA-CONTRIB-2024-006

Date: 
2024-January-24
CVE IDs: 
CVE-2024-13242

The Drupal Swift Mailer module extends the basic e-mail sending functionality provided by Drupal by delegating all e-mail handling to the Swift Mailer library. This enables your site to take advantage of the many features which the Swift Mailer library provides.

The module could allow an attacker to gain widespread access to a Drupal site. This vulnerability is mitigated by the fact that an attacker must have a means to trigger sending an email with a body that they can control, which would requires either another contributed module or custom integration.

Open Social - Moderately critical - Information Disclosure - SA-CONTRIB-2024-005

Date: 
2024-January-24
CVE IDs: 
CVE-2024-13241

Open Social is a Drupal distribution for online communities.

The included optional social_group_flexible_group module doesn't sufficiently validate group updates. The lack of validation makes it possible to have content inside the group changing it's visibility, which could lead to that content being shown to a broader audience than intended.

This vulnerability is mitigated by the fact the module social_group_flexible_group needs to be enabled.

Open Social - Moderately critical - Access bypass - SA-CONTRIB-2024-004

Date: 
2024-January-24
CVE IDs: 
CVE-2024-13240

Content within Open Social can have different visibilities. It is possible for a user to create public content even when this should not be allowed.
This vulnerability is mitigated by the fact that the site must have public visibility disabled on a global level.

Two-factor Authentication (TFA) - Moderately critical - Access bypass - SA-CONTRIB-2024-003

Date: 
2024-January-24
CVE IDs: 
CVE-2024-13239

This module enables you to allow and/or require users to use a second authentication method in addition to password authentication.

In some cases, the module allows users to log in with an authentication plugin that an administrator has disabled.

This vulnerability is mitigated by the fact that an attacker must obtain a valid first-factor login credential, that an administrator must enable and then disable an authentication plugin, and that an attacker must obtain the valid second factor credential for the disabled plugin.

Drupal core - Moderately critical - Denial of Service - SA-CORE-2024-001

Date: 
2024-January-17
CVE IDs: 
CVE-2024-11941

The Comment module allows users to reply to comments. In certain cases, an attacker could make comment reply requests that would trigger a denial of service (DOS).

Sites that do not use the Comment module are not affected.

Typogrify - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-002

Date: 
2024-January-10
CVE IDs: 
CVE-2024-13238

The Typogrify module brings the typographic refinements of Typogrify to Drupal. It provides a text filter and a Twig filter.

The typogrify Twig filter can be used to bypass the Twig auto-escape feature, leading to a persistent Cross Site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that it is only exposed when the twig filter is specifically used in a template to render content.

Pages

Subscribe with RSS Subscribe to Security advisories