View online: https://www.drupal.org/sa-contrib-2018-003
Project: Bible [1]
Date: 2018-January-17
Security risk: *Critical* 17∕25
AC:Basic/A:User/CI:Some/II:All/E:Proof/TD:All [2]
Vulnerability: Multiple Vulnerabilities
Description:
This module enables you to display a Bible on your website. Users can
associate notes with a Bible version.
This module has a vulnerability that would allow an attacker to wipe out,
update or read notes from other users with a carefully crafted title.
A user must have the "Access Bible content" privilege, which is most likely
the default if you have enabled this module.
The code appeared to allow other SQL injection vulnerabilities as well. Many
lines of code were rewritten to make this module more secure. Therefore, even
if you did not give users the "Access Bible content" privilege, there may
have been other SQL vulnerabilities which could have been exploited.
Solution:
Install the latest version:
* If you use the Bible module for Drupal 7.x, upgrade to Bible 7.x-1.7 [3]
Reported By:
* jfhovinne [4]
Fixed By:
* Berend de Boer [5] the module maintainer
* László Csécsy (Boobaa) [6] the module maintainer
Coordinated By:
* Michael Hess [7] of the Drupal Security Team
[1] https://www.drupal.org/project/bible
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/bible/releases/7.x-1.7
[4] https://www.drupal.org/user/77723
[5] https://www.drupal.org/user/143552
[6] https://www.drupal.org/user/199303
[7] https://www.drupal.org/u/mlhess
View online: https://www.drupal.org/sa-contrib-2018-002
Project: Node View Permissions [1]
Version: 8.x-1.x-dev7.x-1.x-dev
Date: 2018-January-10
Security risk: *Moderately critical* 14∕25
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access Bypass
Description:
The Node view permissions module enables the "View own content" and "View any
content" permissions for each content type on the permissions page.
This module has a vulnerability that allows users with these permissions to
view unpublished content that they are not otherwise authorized to view.
* This issue was fixed by the maintainer outside of the normal security team
protocols. Some issues were patched in 2014 for the 7.x version of this
module. The 8.x release was updated within the last 6 months. Both are now
flagged as security updates.*
Solution:
Install the latest version:
* If you use the Node View Permissions module for Drupal 7.x, upgrade to
Node View Permissions 7.x-1.5 [3] or higher.
* If you use the Node View Permissions module for Drupal 8.x, upgrade to
Node View Permissions 8.x-1.1 [4] or higher.
Reported By:
* Heikki Kesa [5]
Fixed By:
* The module maintainer
Coordinated By:
* David Rothstein [6] Of the Drupal Security Team
[1] https://www.drupal.org/project/node_view_permissions
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/node_view_permissions/releases/7.x-1.5
[4] https://www.drupal.org/project/node_view_permissions/releases/8.x-1.1
[5] https://www.drupal.org/u/heikki
[6] https://www.drupal.org/u/david_rothstein
View online: https://www.drupal.org/sa-contrib-2018-001
Project: Stacks [1]
Date: 2018-January-10
Security risk: *Critical* 18∕25
AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Arbitrary PHP code execution
Description:
This module enables content editors to create complex pages and layouts on
the fly without the help from a developer, using reusable widgets.
The module does not sufficiently filter values posted to its AJAX endpoint,
which leads to the instantiation of an arbitrary PHP class.
This vulnerability is mitigated by the fact that only sites with the Stacks -
Content Feed submodule enabled are affected.
Solution:
Install the latest version:
* If you use the Stacks module for Drupal 8.x, upgrade to Stacks 8.x-1.1
[3]
Reported By:
* Jean-François Hovinne [4]
Fixed By:
* Mauro Vigliotti [5] the module maintainer
Coordinated By:
* Michael Hess [6] of the Drupal Security Team
[1] https://www.drupal.org/project/stacks
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/stacks/releases/8.x-1.1
[4] https://www.drupal.org/user/77723
[5] https://www.drupal.org/user/176620
[6] https://www.drupal.org/u/mlhess