Mailjet - Moderately critical - Arbitrary PHP code execution - SA-CONTRIB-2024-062
@bohart, @abramm
PHP notices and warnings fixes.
@mihaskep, @bohart, @abramm
Coding standards, installation bugs, PHP notices and PHP warnings fixes.
https://www.drupal.org/sa-contrib-2024-061
Along with other protections, this release adds the 'allowed_classes' => FALSE option to unserialize() when importing content using the relevant format.
'allowed_classes' => FALSE
unserialize()
See: https://www.php.net/manual/en/function.unserialize.php
POST File - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2024-059.
POST File - Critical - Cross Site Scripting, Arbitrary PHP code execution - SA-CONTRIB-2024-060.
Fix a vulnerability with insufficient filtering on markup rendering.
Tooltip - Moderately critical - Cross site scripting - SA-CONTRIB-2024-058.
See also Basic HTTP Authentication - Critical - Access bypass - SA-CONTRIB-2024-057.
roderik, mr.baileys, dylf, sjerdo
Issues: 2 issues resolved.