View online: https://www.drupal.org/node/2312609
* Advisory ID: DRUPAL-SA-CONTRIB-2014-073
* Project: Date [1] (third-party module)
* Version: 7.x
* Date: 2014-July-30
* Security risk: Moderately Critical [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
Date module provides flexible date/time field type Date field and a Date API
that other modules can use.
The module incorrectly prints date field titles without proper sanitization
thereby opening a Cross Site Scripting (XSS) vulnerability.
The vulnerability is mitigated by the fact that an attacker must have a
permission to create Date fields, such as "administer taxonomy" to add date
fields on taxonomy terms.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
Drupal core is not affected. If you do not use the contributed Date [4]
module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the date module for Drupal 7.x, upgrade to Date 7.x-2.8 [5]
Also see the Date [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Lucas D Hedding [7]
-------- FIXED BY
------------------------------------------------------------
* Vijayachandran Mani [8] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Klaus Purer [9] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].
[1] http://drupal.org/project/date
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/date
[5] https://www.drupal.org/node/2311887
[6] http://drupal.org/project/date
[7] https://www.drupal.org/user/1463982
[8] http://drupal.org/user/93488
[9] https://www.drupal.org/user/262198
[10] http://drupal.org/contact
[11] http://drupal.org/security-team
[12] http://drupal.org/writing-secure-code
[13] http://drupal.org/security/secure-configuration
View online: https://www.drupal.org/node/2312769
* Advisory ID: DRUPAL-SA-CONTRIB-2014-074
* Project:
(third-party module)
* Version: 7.x
* Date: 2014-July-30
* Security risk: (Less Critical) [1]
* Vulnerability: Arbitrary PHP code execution
-------- DESCRIPTION
---------------------------------------------------------
Storage API is a low-level framework for managed file storage and serving.
The module creates an .htaccess file in the files directory to prevent code
execution, but copied the Drupal core file and wasn't updated to include the
improved file contents after SA-CORE-2013-003 [2].
This vulnerability is mitigated by the fact that it only relates to a defense
in depth mechanism, and sites would only be vulnerable if they are hosted on
a server which contains code that does not use protections similar to those
found in Drupal's file API to manage uploads in a safe manner.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
Drupal core is not affected. If you do not use the contributed
module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Storage API module for Drupal 7.x, upgrade to Storage API
7.x-1.6 [4]
Also see the
project page.
-------- REPORTED BY
---------------------------------------------------------
Reported publicly outside the Drupal Security Team reporting process [5].
-------- FIXED BY
------------------------------------------------------------
* Jonathan Brown [6] and Brady Owens [7] the module maintainers
-------- COORDINATED BY
------------------------------------------------------
* Klaus Purer [8] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [9].
Learn more about the Drupal Security team and their policies [10], writing
secure code for Drupal [11], and securing your site [12].
[1] http://drupal.org/security-team/risk-levels
[2] https://www.drupal.org/SA-CORE-2013-003
[3] http://cve.mitre.org/
[4] https://www.drupal.org/node/2312655
[5] https://www.drupal.org/node/101494
[6] http://drupal.org/user/46104
[7] https://www.drupal.org/user/1547200
[8] https://www.drupal.org/user/262198
[9] http://drupal.org/contact
[10] http://drupal.org/security-team
[11] http://drupal.org/writing-secure-code
[12] http://drupal.org/security/secure-configuration
View online: https://www.drupal.org/node/2308503
* Advisory ID: DRUPAL-SA-CONTRIB-2014-072
* Project: freelinking [1] (third-party module)
* Project: freelinking case tracker [2] (third-party module)
* Version: 6.x, 7.x
* Date: 2014-July-23
* Security risk: Critical [3]
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
The freelinking and freelinking case tracker modules implement a filter for
the easier creation of HTML links to other pages in the site or external
sites with a wiki style format such as [[pluginname:identifier]].
The module doesn't sufficiently check access to content when displaying links
to nodes and users. This makes it possible to see node titles, usernames and
potentially other data depending on the site configuration.
This vulnerability is mitigated by the fact that a site must use node access
or permissions to prevent some users from viewing some nodes or users.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [4] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
All versions of Freelinking and Freelinking for case tracker
Drupal core is not affected. If you do not use the contributed freelinking
[5] or freelinking Case tracker [6] modules, there is nothing you need to
do.
-------- SOLUTION
------------------------------------------------------------
Uninstall the module, it is no longer maintained.
Also see the freelinking [7] and freelinking case tracker [8] project pages.
-------- REPORTED BY
---------------------------------------------------------
* Chris Burgess [9]
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [14]
[1] http://drupal.org/project/freelinking
[2] https://www.drupal.org/project/freelinking_casetracker
[3] http://drupal.org/security-team/risk-levels
[4] http://cve.mitre.org/
[5] http://drupal.org/project/freelinking
[6] http://drupal.org/project/freelinking_casetracker
[7] http://drupal.org/project/freelinking
[8] https://www.drupal.org/project/freelinking_casetracker
[9] http://drupal.org/user/76026
[10] http://drupal.org/contact
[11] http://drupal.org/security-team
[12] http://drupal.org/writing-secure-code
[13] http://drupal.org/security/secure-configuration
[14] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2304561
* Advisory ID: DRUPAL-SA-CONTRIB-2014-071
* Project: FileField [1] (third-party module)
* Version: 6.x
* Date: 2014-July-16
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
The FileField module enables you to define and use fields that contain files.
The module doesn't sufficiently check permission to view the attached file
when attaching a file that was previously uploaded. This could allow
attackers to gain access to private files.
This vulnerability is mitigated by the fact that the attacker must have
permission to create or edit content with a file field.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* FileField 6.x-3.x versions prior to 6.x-3.13.
Drupal core is not affected. If you do not use the contributed FileField [4]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
* If you use the FileField module for Drupal 6.x, upgrade to Filefield
6.x-3.13 [5], and also update to Drupal core 6.32 [6] (see
SA-CORE-2014-003 [7]).
-------- REPORTED BY
---------------------------------------------------------
* Ivan Ch [8]
-------- FIXED BY
------------------------------------------------------------
* Nate Haug [9]
* Ivan Ch [10]
* David Snopek [11] of the Drupal Security Team.
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] https://www.drupal.org/project/filefield
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/filefield
[5] https://www.drupal.org/node/2304517
[6] https://www.drupal.org/drupal-6.32-release-notes
[7] https://www.drupal.org/SA-CORE-2014-003
[8] https://www.drupal.org/user/556138
[9] https://www.drupal.org/user/35821
[10] https://www.drupal.org/user/556138
[11] https://www.drupal.org/user/266527
[12] http://drupal.org/contact
[13] http://drupal.org/security-team
[14] http://drupal.org/writing-secure-code
[15] http://drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/SA-CORE-2014-003
* Advisory ID: DRUPAL-SA-CORE-2014-003
* Project: Drupal core [1]
* Version: 6.x, 7.x
* Date: 2014-July-16
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Multiple vulnerabilities
-------- DESCRIPTION
---------------------------------------------------------
Multiple vulnerabilities were fixed in the supported Drupal core versions 6
and 7.
.... Denial of service with malicious HTTP Host header (Base system - Drupal
6 and 7 - Critical)
Drupal core's multisite feature dynamically determines which configuration
file to use based on the HTTP Host header.
The HTTP Host header validation does not sufficiently check
maliciously-crafted header values, thereby exposing a denial of service
vulnerability.
.... Access bypass (File module - Drupal 7 - Critical)
The File module included in Drupal 7 core allows attaching files to pieces of
content. The module doesn't sufficiently check permission to view the
attached file when attaching a file that was previously uploaded. This could
allow attackers to gain access to private files.
This vulnerability is mitigated by the fact that the attacker must have
permission to create or edit content with a file field.
Note: The Drupal 6 FileField [3] module is affected by a similar issue (see
SA-CONTRIB-2014-071 - FileField - Access bypass [4]) and requires an update
to the current security release of Drupal 6 core in order for the fix
released there to work correctly. However, Drupal 6 core itself is not
directly affected.
.... Cross-site scripting (Form API option groups - Drupal 6 and 7 -
Moderately critical)
A cross-site scripting vulnerability was found due to Drupal's form API
failing to sanitize option group labels in select elements. This
vulnerability affects Drupal 6 core directly, and likely affects Drupal 7
forms provided by contributed or custom modules.
This vulnerability is mitigated by the fact that it requires the "administer
taxonomy" permission to exploit in Drupal 6 core, and there is no known
exploit within Drupal 7 core itself.
.... Cross-site scripting (Ajax system - Drupal 7 - Moderately critical)
A reflected cross-site scripting vulnerability was found in certain forms
containing a combination of an Ajax-enabled textfield (for example, an
autocomplete field) and a file field.
This vulnerability is mitigated by the fact that an attacker can only trigger
the attack in a limited set of circumstances, usually requiring custom or
contributed modules.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [5] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Drupal core 6.x versions prior to 6.32.
* Drupal core 7.x versions prior to 7.29.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Drupal 6.x, upgrade to Drupal core 6.32. [6]
* If you use Drupal 7.x, upgrade to Drupal core 7.29. [7]
Also see the Drupal core [8] project page.
-------- REPORTED BY
---------------------------------------------------------
* The denial of service vulnerability using malicious HTTP Host headers was
reported by Régis Leroy [9].
* The access bypass vulnerability in the File module was reported by Ivan
Ch
[10].
* The cross-site scripting vulnerability with Form API option groups was
reported by Károly Négyesi [11].
* The cross-site scripting vulnerability in the Ajax system was reported by
mani22test [12].
-------- FIXED BY
------------------------------------------------------------
* The denial of service vulnerability using malicious HTTP Host headers was
fixed by Régis Leroy [13], and by Klaus Purer [14] of the Drupal
Security
Team.
* The access bypass vulnerability in the File module was fixed by Nate Haug
[15] and Ivan Ch [16], and by Drupal Security Team members David
Rothstein
[17], Heine Deelstra [18] and David Snopek [19].
* The cross-site scripting vulnerability with Form API option groups was
fixed by Greg Knaddison [20] of the Drupal Security Team.
* The cross-site scripting vulnerability in the Ajax system was fixed by
Neil Drumm [21] of the Drupal Security Team.
-------- COORDINATED BY
------------------------------------------------------
* The Drupal Security Team [22]
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [23].
Learn more about the Drupal Security team and their policies [24], writing
secure code for Drupal [25], and securing your site [26].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [27]
[1] http://drupal.org/project/drupal
[2] http://drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/filefield
[4] https://www.drupal.org/node/2304561
[5] http://cve.mitre.org/
[6] https://www.drupal.org/drupal-6.32-release-notes
[7] https://www.drupal.org/drupal-7.29-release-notes
[8] http://drupal.org/project/drupal
[9] https://www.drupal.org/user/1367862
[10] https://www.drupal.org/user/556138
[11] https://www.drupal.org/u/chx
[12] https://www.drupal.org/user/2844779
[13] https://www.drupal.org/user/1367862
[14] https://www.drupal.org/user/262198
[15] https://www.drupal.org/user/35821
[16] https://www.drupal.org/user/556138
[17] https://www.drupal.org/user/124982
[18] https://www.drupal.org/user/17943
[19] https://www.drupal.org/user/266527
[20] https://www.drupal.org/u/greggles
[21] https://www.drupal.org/u/drumm
[22] http://drupal.org/security-team
[23] http://drupal.org/contact
[24] http://drupal.org/security-team
[25] http://drupal.org/writing-secure-code
[26] http://drupal.org/security/secure-configuration
[27] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2304213
* Advisory ID: DRUPAL-SA-CONTRIB-2014-070
* Project: Password Policy [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2014-July-16
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
The Password Policy module enables you to define and enforce password
policies with various constraints on allowable user passwords.
.... Access Bypass (7.x only)
Password Policy has a Password Change Tab submodule which provides a tab for
a user to change their password. Password Policy also has a history
constraint which disallows a user from changing their password to one of a
specified number of their previous passwords.
When the Password Change Tab module and the history constraint are both
enabled, password history will not be stored for a user who changes their
password using the password tab. This will allow the user to change their
password to one of their previous passwords in violation of the history
constraint.
This vulnerability is mitigated by the fact that it only exists when both the
Password Change Tab module and the history constraint are enabled.
.... Access Bypass (6.x and 7.x)
Password Policy has a feature that allows an administrator to force one or
more users to change their password at their next login. Under certain
circumstances, the users may not actually be forced to change their
passwords.
Specifically, if between the time the administrator flags a user for a forced
password change and the time that user logs in, an update operation is
programmatically performed on the user, the user will be no longer be flagged
for a forced password change. For instance, executing the Drush command
drush user-add-role to add a role to a user who is flagged for a password
change would cause that user to no longer be forced to change their password.
This vulnerability is mitigated by the fact that it only affects users for
whom an administrator has forced a password change.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Password Policy 6.x-1.x versions prior to 6.x-1.8.
* Password Policy 7.x-1.x versions prior to 7.x-1.9.
Drupal core is not affected. If you do not use the contributed Password
Policy [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
1) Install the latest version:
* If you use the Password Policy module for Drupal 6.x, upgrade to
Password Policy 6.x-1.8 [5]
* If you use the Password Policy module for Drupal 7.x, upgrade to
Password Policy 7.x-1.9 [6]
2) Force users who may have been affected by the force password change
vulnerability to change their passwords.
Also see the Password Policy [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* AohRveTPV [8]
-------- FIXED BY
------------------------------------------------------------
* AohRveTPV [9] the module maintainer
* Fabio Epifani [10]
-------- COORDINATED BY
------------------------------------------------------
* Michael Hess [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] https://www.drupal.org/project/password_policy
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/password_policy
[5] https://www.drupal.org/node/2303857
[6] https://www.drupal.org/node/2303845
[7] https://www.drupal.org/project/password_policy
[8] http://drupal.org/user/2760115
[9] http://drupal.org/user/2760115
[10] http://drupal.org/user/2840771
[11] https://www.drupal.org/u/mlhess
[12] http://drupal.org/contact
[13] http://drupal.org/security-team
[14] http://drupal.org/writing-secure-code
[15] http://drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2300369
* Advisory ID: DRUPAL-SA-CONTRIB-2014-069
* Project: LoginToboggan [1] (third-party module)
* Version: 7.x
* Date: 2014-July-09
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Access bypass
-------- DESCRIPTION
---------------------------------------------------------
This module enables you to customise the standard Drupal registration and
login processes.
-------- CROSS SITE SCRIPTING
------------------------------------------------
The module doesn't filter user-supplied information from the URL resulting in
a reflected Cross Site Scripting (XSS) vulnerability.
-------- ACCESS BYPASS
-------------------------------------------------------
The module introduces a concept of a "pre-authorized role" which can have
different permissions than the normal Drupal core authorized role.
Logintoboggan usually removes permissions for a user if those permissions are
in the "authorized user" role and not in the "pre-authorized role". The
module failed to remove those permissions for users in a pre-authorized state
on all "Page Not Found" (i.e. 404) pages.
This vulnerability is mitigated by the fact that a site must use the
"pre-authorized role" feature and an attacker would only gain permissions
available to authenticated users and would only gain them on 404 pages which
do not show private information in a default Drupal installation.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Logintoboggan 7.x-1.x versions prior to 7.x-1.4
Drupal core is not affected. If you do not use the contributed LoginToboggan
[4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Logintoboggan module for Drupal 7.x, upgrade to
Logintoboggan 7.x-1.4 [5]
Also see the LoginToboggan [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Mark Mahon [7]
* Joel Walters [8]
-------- FIXED BY
------------------------------------------------------------
* Steve Cowie [9] the module maintainer
* Dan Smith [10] of the Drupal Security Team
* Joel Walters [11]
* Mark Davies [12]
-------- COORDINATED BY
------------------------------------------------------
* Dan Smith [13] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [14].
Learn more about the Drupal Security team and their policies [15], writing
secure code for Drupal [16], and securing your site [17].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [18]
[1] http://drupal.org/project/logintoboggan
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/logintoboggan
[5] https://www.drupal.org/node/2299467
[6] http://drupal.org/project/logintoboggan
[7] https://www.drupal.org/user/1899214
[8] https://www.drupal.org/user/1052318
[9] https://www.drupal.org/user/110518
[10] https://www.drupal.org/user/241220
[11] https://www.drupal.org/user/1052318
[12] https://www.drupal.org/user/243300
[13] http://drupal.org/user/241220
[14] http://drupal.org/contact
[15] http://drupal.org/security-team
[16] http://drupal.org/writing-secure-code
[17] http://drupal.org/security/secure-configuration
[18] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2296783
* Advisory ID: DRUPAL-SA-CONTRIB-2014-068
* Project: Pane [1] (third-party module)
* Version: 7.x
* Date: 2014-July-02
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
This module did not properly sanitize content entered for title. It allowed
sufficiently privileged users to add arbitrary HTML which could result in XSS
attacks.< /p>
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer blocks" or ability to edit Panel panes.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Pane 7.x-2.x versions prior to 7.x-2.5.
Drupal core is not affected. If you do not use the contributed Pane [4]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Pane module for Drupal 7.x, upgrade to Pane 7.x-2.5 [5]
Also see the Pane [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Lucas Hedding [7]
-------- FIXED BY
------------------------------------------------------------
* Lucas Hedding [8]
-------- COORDINATED BY
------------------------------------------------------
* Rick Manelius [9] of the Drupal Security Team
* Greg Knaddison [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] http://drupal.org/project/pane
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/pane
[5] https://www.drupal.org/node/2296651
[6] http://drupal.org/project/pane
[7] https://www.drupal.org/u/heddn
[8] https://www.drupal.org/u/heddn
[9] https://www.drupal.org/user/680072
[10] https://www.drupal.org/user/36762
[11] http://drupal.org/contact
[12] http://drupal.org/security-team
[13] http://drupal.org/writing-secure-code
[14] http://drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2296511
* Advisory ID: DRUPAL-SA-CONTRIB-2014-067
* Project: Meta tags quick [1] (third-party module)
* Version: 7.x
* Date: 2014-July-02
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Open Redirect
-------- DESCRIPTION
---------------------------------------------------------
Meta tags quick adds meta tags editing to all non-administrative pages of
Drupal site.
.... Redirector abuse in path-based meta tag editing form
When editing a path-based meta tag, module does not check destination
parameter of the URL, allowing attacker to pass arbitrary URL to meta tag
editing form.
.... XSS in path-based meta tag editing form
It is possible to inject arbitrary Javascript via the module's Path-based
Metatags edit form that executes when a user attempts to delete a Path-based
Metatag.
Both vulnerabilities are mitigated by the fact that an attacker must have a
role with the permission "Edit path based meta tags".
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Meta tags quick 7.x-2.x versions from and including 7.x-2.1 to 7.x-2.7
(7.x-1.x and 7.x-2.0 are not affected)
Drupal core is not affected. If you do not use the contributed Meta tags
quick [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
If you use the Meta tags quick 7.x-2.x for Drupal 7, upgrade to Meta tags
quick 7.x-2.8 [5]
Also see the Meta tags quick [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Ubani Balogun [7]
-------- FIXED BY
------------------------------------------------------------
* Valery Lourie [8] the module maintainer
* Ubani Balogun [9]
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] http://drupal.org/project/metatags_quick
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/metatags_quick
[5] https://www.drupal.org/node/2295975
[6] http://drupal.org/project/metatags_quick
[7] https://www.drupal.org/user/2858707
[8] https://www.drupal.org/u/valthebald
[9] https://www.drupal.org/user/2858707
[10] https://www.drupal.org/user/36762
[11] http://drupal.org/contact
[12] http://drupal.org/security-team
[13] http://drupal.org/writing-secure-code
[14] http://drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2296495
* Advisory ID: DRUPAL-SA-CONTRIB-2014-066
* Project: Node Access Keys [1] (third-party module)
* Version: 7.x
* Date: 2014-July-02
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
Node Access Keys helps to grant users temporary view permissions to selected
content types on a per user role basis.
It was found that unpublished nodes of content types that that did not have
an access key were visible to all. Also, If an unpublished node of a content
type that was protected by an access key was visited with the access key then
access was granted.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Node Access Keys 7.x-1.x versions prior to 7.x-1.1.
Drupal core is not affected. If you do not use the contributed Node Access
Keys [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Node Access Keys module for Drupal 7.x, upgrade to Node
Access Keys 7.x-1.2 [5]
Also see the Node Access Keys [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* This issue was disclosed publicly.
-------- FIXED BY
------------------------------------------------------------
* Daniel Korte [7] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [8] of the Drupal Security Team
* David Rothstein [9] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [14]
[1] http://drupal.org/project/nodeaccesskeys
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/nodeaccesskeys
[5] http://drupal.org/node/2295895
[6] http://drupal.org/project/nodeaccesskeys
[7] http://drupal.org/user/453668
[8] https://www.drupal.org/user/36762
[9] https://www.drupal.org/user/124982
[10] http://drupal.org/contact
[11] http://drupal.org/security-team
[12] http://drupal.org/writing-secure-code
[13] http://drupal.org/security/secure-configuration
[14] https://twitter.com/drupalsecurity