This module enables you to automatically sort and rename your uploaded files using token based replacement patterns to maintain a nice clean filesystem.
The module doesn't sufficiently sanitize the path while a new file is uploading, allowing a remote attacker to execute arbitrary PHP code.
This vulnerability is mitigated by the fact that an attacker must have access to a form containing a widget processed by this module.
This module enables you to add or overwrite PHP configuration on a drupal website.
The module doesn't sufficiently allow access to set these configurations, leading to arbitrary PHP configuration execution by an attacker.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer phpconfig".
After updating the module, it's important to review the permissions of your website and if 'administer phpconfig' permission is given to a not fully trusted user role, we advise to revoke it.
The Drupal Security Team will be coordinating a security release for Drupal 8 this week on Wednesday, August 1, 2018. (We are issuing this PSA in advance because the in the regular security release window schedule, August 1 would not typically be a core security window.)
The Drupal 8 core release will be made between 16:00 – 21:00 UTC (noon – 5:00pm EDT). It is rated as moderately critical and will be an update to a vendor library only.
This module enables users to select 'other' on certain form elements and a textfield appears for the user to provide a custom value.
The module doesn't sufficiently escape values of a text field the under the scenario when "Select or other" formatter is used.
This vulnerability is mitigated by the fact that an attacker must have access to edit a field that is displayed through the "Select or other" formatter.
This module enables you to create an entityqueue based on a taxonomy.
The module did not properly use Drupal's database API when querying the database with user supplied values, allowing an attacker to send a specially crafted request to modify the query or potentially perform additional queries.
This vulnerability is mitigated by the fact that an attacker must have a role with the "administer entity queue taxonomy" permission.
This theme provides Drupal users with many advanced features including 20 Different Color Styles, 30 User Regions, Custom Block Theme Templates, Suckerfish Menus, Icon Support, Advanced Page Layout Options, Simple Configuration, Custom Typography...
The theme doesn't sufficiently sanitize user input.
This vulnerability is mitigated by the fact that the theme is only exploitable with non-default settings and under certain site configurations.