Group - Critical - Information Disclosure - SA-CONTRIB-2020-030

Date: 
2020-July-29

This module enables you to hand out permissions on a smaller subset, section or community of your website.

The module used to leverage the node grants system but turned it off in its recent 8.x-1.0 release in favor of a system that works for ALL entity types, not just nodes. By doing so, some regular node access checks turned from neutral into allowed because of the way the node grants system operates.

Modal Form - Critical - Access bypass - SA-CONTRIB-2020-029

Date: 
2020-July-22

The Modal form module is a toolset for quick start of using forms in modal windows.

Any form is available for view and submit when the modal_form module is installed. The only requirement is to know the form's fully-qualified class name.

Apigee Edge - Moderately critical - Access bypass - SA-CONTRIB-2020-028

Date: 
2020-July-22

The Apigee Edge module allows connecting a Drupal site to Apigee Edge in order to build a developer portal. It contains an "Apigee Edge Teams" submodule that provides shared app functionality by allowing developers to be organized into teams.

The "Apigee Edge Teams" submodule has an information disclosure vulnerability. The "Add team member" form displays an email autocomplete field which can expose the email addresses of other accounts in the system.

Easy Breadcrumb - Moderately critical - Cross site scripting - SA-CONTRIB-2020-027

Date: 
2020-July-22

This module enables you to use the current URL (path alias) and the current page's title to automatically extract the breadcrumb's segments and its respective links then show them as breadcrumbs on your website.

The module doesn't sufficiently sanitize editor input in certain circumstances leading to a Cross Site Scripting (XSS) vulnerability.

This vulnerability requires the user have 'administer Easy Breadcrumb settings permission'.

Renderkit - Less critical - Access bypass - SA-CONTRIB-2020-026

Date: 
2020-July-01

The renderkit module contains components which can transform the display of field items sent to it.

Some of these components do not respect the '#access' property on the field render element, and thus can make rendered field values visible to visitors who would otherwise not be allowed to see those field values.

This only occurs if all of the following conditions are true:

Drupal core - Less critical - Access bypass - SA-CORE-2020-006

Date: 
2020-June-17
CVE IDs: 
CVE-2020-13665

JSON:API PATCH requests may bypass validation for certain fields.

By default, JSON:API works in a read-only mode which makes it impossible to exploit the vulnerability. Only sites that have the read_only set to FALSE under jsonapi.settings config are vulnerable.

Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2020-005

Date: 
2020-June-17
CVE IDs: 
CVE-2020-13664

Drupal 8 and 9 have a remote code execution vulnerability under certain circumstances.

An attacker could trick an administrator into visiting a malicious site that could result in creating a carefully named directory on the file system. With this directory in place, an attacker could attempt to brute force a remote code execution vulnerability.

Windows servers are most likely to be affected.

Drupal core - Critical - Cross Site Request Forgery - SA-CORE-2020-004

Date: 
2020-June-17
CVE IDs: 
CVE-2020-13663

The Drupal core Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities.

Internationalization - Moderately critical - Cross site scripting - SA-CONTRIB-2020-025

Date: 
2020-June-17

The Internationalization (i18n) module is a collection of modules to extend Drupal core multilingual capabilities and allows to build real life multilingual sites.

A value in the term translation module is displayed without being escaped leading to a Cross Site Scripting (XSS) vulnerability.

Pages

Subscribe with RSS Subscribe to Security advisories