View online: https://www.drupal.org/sa-contrib-2024-037
Project: Open Social [1]
Date: 2024-September-04
Security risk: *Moderately critical* 13∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross Site Scripting, Denial of Service
Affected versions: <12.3.8 || >=12.4.0 <12.4.5 || >=13.0.0 <13.0.0-alpha11
Description:
Open Social is a Drupal distribution for online communities, which ships with
an optional module called Social Embed.
This module allows a website to display embedded content (such as photos or
videos) when a user posts a link to that resource, without having to parse
the resource directly.
Added URL's were not sufficiently validated which could lead to a DoS via
Blind SSRF and/or Application Takeover via Stored XSS.
This vulnerability is mitigated by the fact that social_embed submodule needs
to be enabled.
Solution:
Install the latest version:
* If you use Open Social 12.3.x, upgrade to Open Social 12.3.8 [3]
* If you use Open Social 12.4.x, upgrade to Open Social 12.4.5 [4]
Reported By:
* Thiago Régis [5]
Fixed By:
* Thiago Régis [6]
* Ronald te Brake [7]
Coordinated By:
* Greg Knaddison [8] of the Drupal Security Team
* Juraj Nemec [9] of the Drupal Security Team
[1] https://www.drupal.org/project/social
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/social/releases/12.3.8
[4] https://www.drupal.org/project/social/releases/12.4.5
[5] https://www.drupal.org/user/277221
[6] https://www.drupal.org/user/277221
[7] https://www.drupal.org/user/2314038
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10
View online: https://www.drupal.org/sa-contrib-2024-036
Project: Paragraphs table [1]
Date: 2024-September-04
Security risk: *Critical* 15∕25
AC:None/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass, Information Disclosure
Affected versions: <1.23.0 || >=2.0.0 <2.0.2
Description:
This module enables field collections to be displayed as tables. It supports
display suite and field permissions and provides operations (modify, delete,
duplicate).
This module has multiple vulnerabilities due to the requirements on the
routes it provides not being restrictive enough.
-------- INFORMATION DISCLOSURE
----------------------------------------------
Several routes /only/ checked for the 'access content' permission before
displaying a paragraph, and did not check whether the user should actually
have access to view the paragraph in question.
-------- ACCESS BYPASS
-------------------------------------------------------
The paragraphs_item.add_page route previously allowed anyone with the 'access
content' permission to add paragraphs to any content regardless of
permissions to be able to edit the host field or content, or any other hooks
for adjusting access to add paragraphs of that type.
These vulnerabilities are mitigated by the fact that an attacker must have a
role with the permission "access content" which is commonly assigned to all
roles.
Solution:
Install the latest version:
* If you use the paragraphs_table module 8.x-1.x, upgrade to
paragraphs_table 8.x-1.23 [3]
* If you use the paragraphs_table module 2.0.x, upgrade to paragraphs_table
2.0.2 [4] or newer
Reported By:
* James Williams [5]
Fixed By:
* James Williams [6]
* NGUYEN Bao [7]
* Steven Jones [8]
* Joseph Olstad [9]
Coordinated By:
* Greg Knaddison [10] of the Drupal Security Team
* Jess [11] of the Drupal Security Team
* Juraj Nemec [12] of the Drupal Security Team
[1] https://www.drupal.org/project/paragraphs_table
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/paragraphs_table/releases/8.x-1.23
[4] https://www.drupal.org/project/paragraphs_table/releases/2.0.2
[5] https://www.drupal.org/user/592268
[6] https://www.drupal.org/user/592268
[7] https://www.drupal.org/user/2896581
[8] https://www.drupal.org/user/99644
[9] https://www.drupal.org/user/1321830
[10] https://www.drupal.org/u/greggles
[11] https://www.drupal.org/u/xjm
[12] https://www.drupal.org/u/poker10
View online: https://www.drupal.org/sa-contrib-2024-035
Project: Content Entity Clone [1]
Date: 2024-September-04
Security risk: *Moderately critical* 11∕25
AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:All [2]
Vulnerability: Information Disclosure
Affected versions: <1.0.4
Description:
This module enables you to "clone" a content entity, i.e. to create a new
content pre-filled with data from another entity of the same type and bundle.
The module doesn't properly check the user access to the original entity,
allowing users to create a new entity (they have permission to create)
pre-filled with content from another entity of the same type and bundle that
they would normally not have access to.
This vulnerability is mitigated by the fact that an attacker must have the
permission to create content of the type of the entity to clone.
Solution:
Install the latest version:
* If you use the content_entity_clone module prior to version 1.0.4,
upgrade
to content_entity_clone 1.0.4 [3]
Reported By:
* Vojislav Jovanovic [4]
Fixed By:
* orakili [5]
* Vojislav Jovanovic [6]
Coordinated By:
* Greg Knaddison [7] of the Drupal Security Team
* Juraj Nemec [8] of the Drupal Security Team
[1] https://www.drupal.org/project/content_entity_clone
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/content_entity_clone/releases/1.0.4
[4] https://www.drupal.org/user/92189
[5] https://www.drupal.org/user/1287634
[6] https://www.drupal.org/user/92189
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/user/272316