Webform - Moderately critical - Access bypass - SA-CONTRIB-2021-004

Date: 
2021-March-03

The Webform module for Drupal 8/9 includes a default Contact webform, which sends a notification email to the site owner and a confirmation email to the email address supplied via the form.

The confirmation email can be used as an open mail relay to send an email to any email address.

Subgroup - Less critical - Access bypass - SA-CONTRIB-2021-003

Date: 
2021-January-27

This module enables you to add groups to other groups in a tree structure where access can be inherited up or down the tree.

When you configure Subgroup to have a tree with at least three levels, users may inadvertently get permissions in a group that is an uncle or cousin of the source group, rather than a direct ancestor or descendant. Trees with only multiple nodes at the lowest tier (or nowhere) are unaffected.

Open Social - Moderately critical - Access bypass - SA-CONTRIB-2021-002

Date: 
2021-January-27

The Social User Export module enables users within Open Social to create an export of users and download this to a CSV file.

The module doesn't sufficiently check access when building the CSV file, allowing logged-in users without the manage members permission to be able to export all data from a selected user in certain scenarios.

This vulnerability is mitigated by the fact that an attacker must have the authenticated user role and the site must have the configuration set in such a way a logged in user is able to export users.

Open Social - Moderately critical - Access bypass - SA-CONTRIB-2021-001

Date: 
2021-January-27

The optional Social Auth Extra module enables you to use the single sign-on methods provided by Open Social e.g. Facebook, LinkedIn, Google and Twitter.

The module doesn't implement a proper cache strategy for anonymous users allowing the registration form to be cached with disclosed information in certain scenarios. The information is usually only available for logged-in users of the community.

Drupal core - Critical - Third-party libraries - SA-CORE-2021-001

Date: 
2021-January-20

The Drupal project uses the pear Archive_Tar library, which has released a security update that impacts Drupal. For more information please see:

Exploits may be possible if Drupal is configured to allow .tar, .tar.gz, .bz2, or .tlz file uploads and processes them.

Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2020-013

Date: 
2020-November-25
CVE IDs: 
CVE-2020-28949
CVE-2020-28948

The Drupal project uses the PEAR Archive_Tar library. The PEAR Archive_Tar library has released a security update that impacts Drupal. For more information please see:

SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider - Critical - Access bypass - SA-CONTRIB-2020-038

Date: 
2020-November-18

This module enables your users residing at a SAML 2.0 compliant Identity Provider to login to your Drupal website.

The module has two Authentication Bypass vulnerabilities.

Ink Filepicker - Critical - Unsupported - SA-CONTRIB-2020-037

Date: 
2020-November-18

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer.

It looks like the 3rd party service that this module integrates with may have been retired.

If you would like to maintain this project nevertheless, please read: https://www.drupal.org/node/251466#procedure---own-project---unsupported

Drupal core - Critical - Remote code execution - SA-CORE-2020-012

Date: 
2020-November-18
CVE IDs: 
CVE-2020-13671

Update November 18: Documented longer list of dangerous file extensions

Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations.

Pages

Subscribe with RSS Subscribe to Security advisories