Download All Files - Critical - Access bypass - SA-CONTRIB-2024-069

Date: 
2024-December-04
CVE IDs: 
CVE-2024-13303

This module provides a field formatter for the field type 'file' called `Table of files with download all link` .

The module had vulnerabilities allowing a user to download files they normally should not be able to download.

Pages Restriction Access - Critical - Access bypass - SA-CONTRIB-2024-068

Date: 
2024-December-04
CVE IDs: 
CVE-2024-13302

Module to restrict access from anonymous and regular users to configured pre-defined pages.

The module does not adequately handle protecting certain types of URLs.

OAuth Client & OpenID Connect SSO | OAuth/OIDC Login - Critical - Cross Site Scripting - SA-CONTRIB-2024-067

Date: 
2024-December-04
CVE IDs: 
CVE-2024-13301

This module enables you to authenticate users through an Identity Provider (IdP) or OAuth Server, allowing them to log in to your Drupal site.

The module does not sufficiently escape query parameters sent to the callback URL when displaying error messages, particularly if the code parameter is missing in the response.

Print Anything - Critical - Unsupported - SA-CONTRIB-2024-066

Date: 
2024-December-04
CVE IDs: 
CVE-2024-13300

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...

Megamenu Framework - Critical - Unsupported - SA-CONTRIB-2024-065

Date: 
2024-December-04
CVE IDs: 
CVE-2024-13299

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...

Tarte au Citron - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-064

Date: 
2024-November-27
CVE IDs: 
CVE-2024-13298

This module integrates Tarte au citron JS library with Drupal and prevent services to be loaded without user consent. Administrators can enable and configure services which will be managed by Tarte au citron.

When Google Tag Manager (GTM) service is enabled, an attacker can load a GTM container that can completely change the page or insert malicious JS.

This vulnerability is mitigated by the fact that the attacker must have a role with the permission "administer tarte au citron".

Eloqua - Moderately critical - Arbitrary PHP code execution - SA-CONTRIB-2024-063

Date: 
2024-November-20
CVE IDs: 
CVE-2024-13297

This module integrates webforms with eloqua, an automated marketing and demand generation software built to improve the quality and quantity of customers' sales leads and streamline their sales processes.

In certain cases the module doesn't sufficiently sanitize data before passing it to PHP's unserialize() function, which could result in Remote Code Execution via PHP Object Injection.

Mailjet - Moderately critical - Arbitrary PHP code execution - SA-CONTRIB-2024-062

Date: 
2024-November-20
CVE IDs: 
CVE-2024-13296

This module for Drupal provides complete control of Email settings with Drupal and Mailjet.

In certain cases the module doesn't securely pass data to PHP's unserialize() function, which could result in Remote Code Execution via PHP Object Injection.

This vulnerability is mitigated by the fact that an attack must operate with the permission "administer mailjet module", however this could be the case if this issue were combined with others in an "attack chain".

Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-008

Date: 
2024-November-20
CVE IDs: 
CVE-2024-55638

Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable.

This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to unserialize(). There are no such known exploits in Drupal core.

Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-007

Date: 
2024-November-20
CVE IDs: 
CVE-2024-55637

Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable.

This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to unserialize(). There are no such known exploits in Drupal core.

Pages

Subscribe with RSS Subscribe to Security advisories