View online: https://www.drupal.org/sa-contrib-2022-043
Project: Open Social [1]
Date: 2022-May-25
Security risk: *Moderately critical* 14∕25
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
Description:
Open Social is a Drupal distribution for online communities.
Group entities created within Open Social did not sufficiently check entity
access in group overviews, allowing users to see information in the overviews
they should not have access to. Visiting the entity directly resulted in
correct access checks applied.
This vulnerability is mitigated by the fact that an attacker must be able to
view Group entities in an overview and have certain common permissions
revoked.
Please note the affected versions were already unsupported, this advisory is
released additionally as there are still reported installs for the affected
versions.
Solution:
Install the latest versions:
* If you use Open Social versions prior to 11.0.0, upgrade to at least Open
Social 11.0.0 [3] where this issue is resolved
Preferably use one of the supported versions:
* Open Social 11.3.0 [4]
* Open Social 11.2.3 [5]
* Open Social 11.1.7 [6]
Reported By:
* Dmitry Kiselev [7]
Fixed By:
A variety of people as part of upgrading to version 11.
Coordinated By:
* Greg Knaddison [8] of the Drupal Security Team
* Damien McKenna [9] of the Drupal Security Team
* Alex Bronstein [10] of the Drupal Security Team
[1] https://www.drupal.org/project/social
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/social/releases/11.0.0
[4] https://www.drupal.org/project/social/releases/11.3.0
[5] https://www.drupal.org/project/social/releases/11.2.3
[6] https://www.drupal.org/project/social/releases/11.1.7
[7] https://www.drupal.org/user/1945174
[8] https://www.drupal.org/user/36762
[9] https://www.drupal.org/user/108450
[10] https://www.drupal.org/user/78040
View online: https://www.drupal.org/sa-contrib-2022-035
Project: Doubleclick for Publishers (DFP) [1]
Date: 2022-May-04
Security risk: *Moderately critical* 13∕25
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross site scripting
Description:
Doubleclick for Publishers (DFP) module enables a site to place ads from
Doubleclick For Publishers.
The module doesn't sanitize user input in certain cases, which leads to
Cross-Site-Scripting (XSS) vulnerabilities. An attacker that can create or
edit certain entities may be able to exploit a Cross-Site-Scripting (XSS)
vulnerability to target visitors of the site, including site admins with
privileged access.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer DFP".
Solution:
Install the latest version:
* If you use the Doubleclick for Publishers module for Drupal 9.x, upgrade
to DFP 8.x-1.2 [3]
Note that the Drupal 7 version of this module is unaffected.
Reported By:
* John Herreño [4]
Fixed By:
* John Herreño [5]
* Marcelo Vani [6]
Coordinated By:
* Lee Rowlands [7] of the Drupal Security Team
* Greg Knaddison [8] of the Drupal Security Team
* Damien McKenna [9] of the Drupal Security Team
[1] https://www.drupal.org/project/dfp
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/dfp/releases/8.x-1.2
[4] https://www.drupal.org/user/350711
[5] https://www.drupal.org/user/350711
[6] https://www.drupal.org/user/854220
[7] https://www.drupal.org/user/395439
[8] https://www.drupal.org/user/36762
[9] https://www.drupal.org/user/108450