View online: https://www.drupal.org/sa-contrib-2022-027
Project: GOV.UK Theme [1]
Date: 2022-February-23
Security risk: *Moderately critical* 14∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross site scripting
Description:
The GOV.UK Theme (govuk_theme) is a Drupal theme for the GOV.UK Design
System.
The theme doesn't sanitize user input in certain cases, which leads to
Cross-Site-Scripting (XSS) vulnerabilities. An attacker that can create or
edit certain entities or configuration may be able to exploit one or more
Cross-Site-Scripting (XSS) vulnerabilities to target visitors of the site,
including site admins with privileged access.
The vulnerability is mitigated by the facts, that:
* An attacker must have one of several permissions, of which at least some
are commonly only assigned to either editors, site builders or
administrators.
* For some of the vulnerabilities, certain contributed modules must be
enabled.
Solution:
Install the latest version:
* If you use the govuk_theme for Drupal 9.x, upgrade to govuk_theme 8.x-1.9
[3]
Reported By:
* Patrick Fey [4]
Fixed By:
* Andrew Hughes-Onslow [5]
* Patrick Fey [6]
Coordinated By:
* Chris McCafferty [7] of the Drupal Security Team
[1] https://www.drupal.org/project/govuk_theme
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/govuk_theme/releases/8.x-1.9
[4] https://www.drupal.org/user/998680
[5] https://www.drupal.org/user/2547946
[6] https://www.drupal.org/user/998680
[7] https://www.drupal.org/user/1850070
View online: https://www.drupal.org/psa-2022-02-23
Date: 2022-February-23
Description:
*Drupal 7's End-of-Life extended to November 1, 2023 *
More than a decade after its first release, Drupal 7 is still widely used
across the web. It can be found powering civic engagement in government
installations; managing vast amounts of content for faculty, students, and
staff in educational institutions; and providing the digital backbone for
many businesses and non-profit organizations. Drupal 9 is well-maintained,
secure, stable, and feature-rich, but many organizations still rely on Drupal
7.
The teams that built and still maintain these legacy Drupal installations,
and the end users they serve, are important constituents of the Drupal
community. Although these users should still plan their upgrade to a newer
version of Drupal, if they are unable to upgrade before the currently
announced end-of-life, it would not be responsible of us to leave them
vulnerable.
* Therefore, we are announcing that moving forward, the scheduled Drupal 7
End-of-Life date will be re-evaluated annually. As of today, we are extending
the end-of-life by one year to November 1, 2023. *
The Drupal project lead, Dries Buytaert, the Drupal Association, and the
Drupal Security Working Group have been monitoring the Drupal 7 ecosystem
since the previous end-of-life extension [1]. As a majority of all sites in
the Drupal project are still on Drupal 7, we have decided that there is a
clear need to provide additional support to the members of our community
still using this version. At the end of the day, we have a moral imperative
to keep as many of those sites secure as we can.
We will announce by July 2023 whether we will extend Drupal 7 community
support an additional year. Factors that we will consider are community
support, Drupal 7 usage, and active Drupal 7 maintainers. Current support is
made possible thanks to the many Drupal 7 maintainers and companies that are
paying to support Drupal 7.
You can donate to the Drupal Security Team on our Donations [2] page.
For press contacts please email security-press(a)drupal.org [3]
Coordinated By:
The following people contributed to this public service announcement.
Michael Hess
Tim Lehnen
Greg Knaddison
Dries Buytaert
xjm
Gábor Hojtsy
Madison Atkins
[1] https://www.drupal.org/psa-2021-06-29
[2] https://donorbox.org/drupal-security
[3] mailto:security-press@drupal.org
View online: https://www.drupal.org/sa-contrib-2022-023
Project: Fancy File Delete [1]
Date: 2022-February-09
Security risk: *Moderately critical* 14∕25
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access Bypass
Description:
This module enables you to manage and delete files.
The module doesn't sufficiently protect unmanaged files from view under the
scenario unauthenticated user knows path to visit the view and can attempt to
delete files which results in duplicate files being created.
To mitigate this issue without deploying code, review all views that are
based on Fancy File Delete and ensure they have an access control set to use
the permission "administer unmanaged files entities".
Solution:
Install the latest version *and do check your views configuration*:
1) If you use the Fancy File Delete module for Drupal ^8.x , upgrade to
Fancy File Delete 2.0.7 [3]
2) Review all views that are based on Fancy File Delete and ensure they
have
an access control set to use the permission "administer unmanaged files
entities".
Reported By:
* Ambient.Impact [4]
Fixed By:
* Daniel Pickering [5]
* Jaime Seuma [6]
Coordinated By:
* Chris McCafferty [7] of the Drupal Security Team
[1] https://www.drupal.org/project/fancy_file_delete
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/fancy_file_delete/releases/2.0.7
[4] https://www.drupal.org/user/1131532
[5] https://www.drupal.org/user/3285813
[6] https://www.drupal.org/user/3589760
[7] https://www.drupal.org/user/1850070