View online: https://www.drupal.org/sa-contrib-2017-096
Project: Directory based organisational layer [1]
Date: 2017-December-20
Security risk: *Critical* 18∕25
AC:None/A:None/CI:Some/II:Some/E:Proof/TD:Default [2]
Vulnerability: Unsupported
Description:
This module adds a new organizational layer to Drupal, making it easy for
managing large numbers of files and nodes.
The security team is marking this module unsupported. There is a known
security issue with the module that has not been fixed by the maintainer. The
security team takes action in cases like this without regard to the severity
of the security issue in question. If you would like to maintain this module,
please read: https://www.drupal.org/node/251466 [3]
All projects that are being marked unsupported are given a score of critical.
Code that is no longer maintained poses a threat to securing sites.
Solution:
If you use the Directory based organisational layer tag module for Drupal you
should uninstall it.
Reported By:
Jean-Francois Hovinne [4]
Fixed By:
N/A
[1] https://www.drupal.org/project/odir
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/node/251466
[4] https://www.drupal.org/u/jfhovinne
View online: https://www.drupal.org/sa-contrib-2017-095
Project: ComScore direct tag [1]
Date: 2017-December-20
Security risk: *Critical* 18∕25
AC:None/A:None/CI:Some/II:Some/E:Proof/TD:Default [2]
Vulnerability: Unsupported
Description:
A simple module to add in the JS for the comScore Direct tag to your Drupal
site.
The security team is marking this module unsupported. There is a known
security issue with the module that has not been fixed by the maintainer. The
security team takes action in cases like this without regard to the severity
of the security issue in question. If you would like to maintain this module,
please read: https://www.drupal.org/node/251466 [3]
All projects that are being marked unsupported are given a score of critical.
Code that is no longer maintained poses a threat to securing sites.
Solution:
If you use the ComScore Direct tag module for Drupal you should uninstall it.
Reported By:
Balazs Janos Tatar [4]
Fixed By:
N/A
[1] https://www.drupal.org/project/comscore_direct
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/node/251466
[4] https://www.drupal.org/u/tatarbj
View online: https://www.drupal.org/sa-contrib-2017-094
Project: Link Click Count [1]
Date: 2017-December-20
Security risk: *Critical* 18∕25
AC:None/A:None/CI:Some/II:Some/E:Proof/TD:Default [2]
Vulnerability: Unsupported
Description:
The Link Click Count module helps you to monitor the traffic to your website
by creating link fields. These link fields can be individual links or
internal/external links that can be added to the content type.
The security team is marking this module unsupported. There is a known
security issue with the module that has not been fixed by the maintainer. The
security team takes action in cases like this without regard to the severity
of the security issue in question. If you would like to maintain this module,
please read: https://www.drupal.org/node/251466 [3]
All projects that are being marked unsupported are given a score of critical.
Code that is no longer maintained poses a threat to securing sites.
Solution:
If you use the link click count module for Drupal you should uninstall it.
Reported By:
Karthik Kumar D K [4]
Fixed By:
N/A
[1] https://www.drupal.org/project/link_click_count
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/node/251466
[4] https://www.drupal.org/u/heykarthikwithu
View online: https://www.drupal.org/sa-contrib-2017-091
Project: Configuration Update Manager [1]
Version: 8.x-1.4
Date: 2017-December-06
Security risk: *Moderately critical* 12∕25
AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross Site Request Forgery (CSRF)
Description:
The Configuration Update Reports sub-module in the Configuration Update
module project enables you to run reports to see what configuration on your
site differs from the configuration distributed by a module, theme, or
installation profile, and to revert, delete, or import configuration.
This module doesn't sufficiently protect the Import operation, thereby
exposing a Cross Site Request Forgery (CSRF) vulnerability which can be
exploited by unprivileged users to trick an administrator into unwanted
import of configuration.
This vulnerability is mitigated by the fact that only configuration items
distributed with a module, theme, or installation profile that is currently
installed and enabled on the site can be imported, not arbitrary
configuration values.
Solution:
Install the latest version:
* If you use the Configuration Update Manager module and its Reports
sub-module for Drupal 8.x, upgrade to Configuration Update Manager
version
8.x-1.5 [3]
Alternatively, you could remove the permission "import configuration" from
all roles on the site, or uninstall the Configuration Update Reports
sub-module from your production sites.
Also see the Configuration Update Manager [4] project page.
Reported By:
* Jean-Francois Hovinne [5]
Fixed By:
* Jennifer Hodgdon [6] the module maintainer
Coordinated By:
* Greg Knaddison [7] of the Drupal Security Team
* Lee Rowlands [8] of the Drupal Security Team
[1] https://www.drupal.org/project/config_update
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/config_update/releases/8.x-1.5
[4] https://www.drupal.org/project/config_update
[5] https://www.drupal.org/u/jfhovinne
[6] https://www.drupal.org/u/jhodgdon
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/u/larowlan
View online: https://www.drupal.org/sa-contrib-2017-089
Project: Mailhandler [1]
Version: 7.x-2.10
Date: 2017-December-06
Security risk: *Critical* 17∕25
AC:Complex/A:User/CI:All/II:All/E:Theoretical/TD:All [2]
Vulnerability: Remote Code Execution
Description:
The Mailhandler module enables you to create nodes by email.
The Mailhandler module does not validate file attachments. By sending a
correctly crafted e-mail to a mailhandler mailbox an attacker can execute
arbitrary code.
The vulnerability applies to any active mailhandler mailbox, whether or not
attachments are mapped to a field.
*Mitigating factors:*
* For 7.x versions prior to 7.x-2.5, the vulnerability is mitigated by the
fact that the 'MailhandlerCommandsFiles' plugin must be enabled. For
later
versions, the option to disable commands was removed, all commands are
enabled in any case.
* The vulnerability is mitigated by the fact that the attacker must pass
the
authentication step. The default authentication is that the attacker must
send the crafted e-mail from a registered e-mail address.
* The vulnerability is mitigated by the fact that the mailhandler mailbox
e-mail address must be known by the attacker. This essentially depends on
the usecase, e.g. Mailcomment module.
* The vulnerability is mitigated by the fact that the webserver
configuration must either permit the execution of some file extensions in
the public filesystem or (Apache) has '.htaccess' support enabled through
the AllowOverride directive.
Solution:
Install the latest version:
* If you use the Mailhandler module for Drupal 7.x, upgrade to Mailhandler
7.x-2.11 [3]
Also see the Mailhandler [4] project page.
Reported By:
* Marc Darcis [5]
Fixed By:
* Marc Darcis [6]
* Nathaniel Catchpole [7]
* Milos Bovan [8]
Coordinated By:
* Greg Knaddison [9] of the Drupal Security Team
[1] https://www.drupal.org/project/mailhandler
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/mailhandler/releases/7.x-2.11
[4] https://www.drupal.org/project/mailhandler
[5] https://www.drupal.org/user/3552485
[6] https://www.drupal.org/user/3552485
[7] https://www.drupal.org/user/35733
[8] https://www.drupal.org/u/mbovan
[9] https://www.drupal.org/u/greggles