View online: https://www.drupal.org/sa-contrib-2024-003
Project: Two-factor Authentication (TFA) [1]
Date: 2024-January-24
Security risk: *Moderately critical* 14∕25
AC:Complex/A:None/CI:Some/II:Some/E:Proof/TD:Uncommon [2]
Vulnerability: Access bypass
Affected versions: <1.5.0
Description:
This module enables you to allow and/or require users to use a second
authentication method in addition to password authentication.
In some cases, the module allows users to log in with an authentication
plugin that an administrator has disabled.
This vulnerability is mitigated by the fact that an attacker must obtain a
valid first-factor login credential, that an administrator must enable and
then disable an authentication plugin, and that an attacker must obtain the
valid second factor credential for the disabled plugin.
Solution:
Install the latest 8.x-1.2 version:
* If you use the Two-factor Authentication (TFA) for Drupal 8, 9, or 10
upgrade to TFA 8.x-1.5 [3]
After installing this update disabled plugins will no longer be offered or
accepted as a second factor option.
If an account is configured with only disabled plugins login will be
prohibited and the the configured TFA "Help text" displayed instead of a
second factor prompt.
To allow access for a locked out user site owners may consider enabling the
plugin (admin/config/people/tfa) or may use their existing procedures for
granting access to accounts where the user has forgotten/lost their second
factor tokens.
Accounts with both enabled and disabled plugins will prompt the account owner
with one of the remaining enabled plugins.
Reported By:
* Ide Braakman [4]
Fixed By:
* Conrad Lara [5]
* Juraj Nemec [6] of the Drupal Security Team
* João Ventura [7]
Coordinated By:
* Damien McKenna [8] of the Drupal Security Team
* Greg Knaddison [9] of the Drupal Security Team
* Benji Fisher [10] of the Drupal Security Team
[1] https://www.drupal.org/project/tfa
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/tfa/releases/8.x-1.5
[4] https://www.drupal.org/user/1879760
[5] https://www.drupal.org/user/1790054
[6] https://www.drupal.org/user/272316
[7] https://www.drupal.org/user/122464
[8] https://www.drupal.org/user/108450
[9] https://www.drupal.org/user/36762
[10] https://www.drupal.org/user/683300
View online: https://www.drupal.org/sa-contrib-2024-002
Project: Typogrify [1]
Date: 2024-January-10
Security risk: *Moderately critical* 12∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Cross Site Scripting
Affected versions: <1.3.0
Description:
The Typogrify module brings the typographic refinements of Typogrify to
Drupal. It provides a text filter and a Twig filter.
The typogrify Twig filter can be used to bypass the Twig auto-escape feature,
leading to a persistent Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that it is only exposed when the
twig filter is specifically used in a template to render content.
Solution:
Install the latest version:
* If you use the Typogrify module for Drupal 10.x, upgrade to Typogrify
8.x-1.3 [3]
If you use the typogrify Twig filter provided by this module, then this
update may cause double-encoding of text. See the updated README for best
practices.
Reported By:
* Pierre Rudloff [4]
Fixed By:
* Benji Fisher [5] of the Drupal Security Team
Coordinated By:
* Damien McKenna [6] of the Drupal Security Team
* Greg Knaddison [7] of the Drupal Security Team
[1] https://www.drupal.org/project/typogrify
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/typogrify/releases/8.x-1.3
[4] https://www.drupal.org/user/3611858
[5] https://www.drupal.org/user/683300
[6] https://www.drupal.org/user/108450
[7] https://www.drupal.org/user/36762
View online: https://www.drupal.org/sa-contrib-2023-055
Project: Data Visualisation Framework [1]
Date: 2023-December-20
Security risk: *Moderately critical* 14∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross Site Scripting
Affected versions: < 2.0.2
Description:
This module allows you to turn various data sources (Eg CSV or JSON file)
into interactive visualisation. The DVF module provides a field (storage,
widget & formatter) that can be added to any entity.
This module uses two third-party JS libraries having from low to medium
vulnerabilities. One of the vulnerabilities is a Cross Site Scripting
vulnerability that may affect Drupal sites as a Persistent Cross Site
Scripting vulnerability (i.e. not reflected). This release updates the
libraries.
The issue is mitigated by the fact an attacker needs the permission to create
or edit content that is displayed using the Data Visualization Framework.
Solution:
Install the latest version:
* If you use the Data Visualisation Framework for Drupal module (DVF for
short), upgrade to dvf 2.0.2 [3]
Reported By:
* Joseph Zhao [4]
Fixed By:
* Joseph Zhao [5]
Coordinated By:
* Damien McKenna [6] of the Drupal Security Team
* Greg Knaddison [7] of the Drupal Security Team
* cilefen [8] of the Drupal Security Team
* Lee Rowlands [9] of the Drupal Security Team
[1] https://www.drupal.org/project/dvf
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/dvf/releases/2.0.2
[4] https://www.drupal.org/user/1987218
[5] https://www.drupal.org/user/1987218
[6] https://www.drupal.org/u/DamienMcKenna
[7] https://www.drupal.org/user/36762
[8] https://www.drupal.org/u/cilefen
[9] https://www.drupal.org//www.drupal.org/u/larowlan
View online: https://www.drupal.org/sa-contrib-2023-054
Project: Group [1]
Date: 2023-December-06
Security risk: *Less critical* 8∕25
AC:Complex/A:User/CI:Some/II:None/E:Theoretical/TD:Uncommon [2]
Vulnerability: Access bypass
Affected versions: >=2.0.0 <2.2.2 || >=3.0.0 <3.2.2
Description:
The Group module has the ability to make content private to specific groups.
When viewing a list of entities, e.g. nodes, a visitor should only see those
entities that are either not attached to a group or that they have group
access to.
The module doesn't sufficiently enforce list access under the scenario where
two users have the same outsider and insider permissions, but are members of
different groups without any individual roles being assigned to said
memberships. In such a scenario, the permissions hash for both will be the
same even though it should differ.
This vulnerability is mitigated by the fact that an attacker must have the
same hash as someone else, which is quite rare yet not unthinkable.
Solution:
Install the latest version:
* Sites using Group version 2 should upgrade to Group v2.2.2 [3]
* Sites using Group version 3 should upgrade to Group v3.2.2 [4]
Reported By:
* Dylan Donkersgoed [5]
Fixed By:
* Dylan Donkersgoed [6]
* Péter Keszthelyi [7]
* Austin Mitchell [8]
* Ian Bullock [9]
Coordinated By:
* Damien McKenna [10] of the Drupal Security Team
* Greg Knaddison [11] of the Drupal Security Team
[1] https://www.drupal.org/project/group
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/group/releases/2.2.2
[4] https://www.drupal.org/project/group/releases/3.2.2
[5] https://www.drupal.org/user/2803351
[6] https://www.drupal.org/user/2803351
[7] https://www.drupal.org/user/1939064
[8] https://www.drupal.org/user/3534491
[9] https://www.drupal.org/user/1291942
[10] https://www.drupal.org/user/108450
[11] https://www.drupal.org/user/36762
View online: https://www.drupal.org/sa-contrib-2023-051
Project: GraphQL [1]
Date: 2023-November-08
Security risk: *Moderately critical* 12∕25
AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross Site Request Forgery
Affected versions: <3.4.0 || >=4.0.0 <4.6.0
Description:
The GraphQL module enables you to build GraphQL APIs which can include data
fetching through Queries and data updates (create, update, delete) through
mutations.
The module does not sufficiently validate incoming requests that are made
from domains other than the one serving the GraphQL endpoint. In case a user
visits a malicious site, that site may make requests on the users behalf
which can lead to the execution of mutations, exposing a CSRF vulnerability.
Whether data is returned to the malicious site depends on your sites CORS
configuration.
This vulnerability is mitigated by the fact that a user with access to the
API must have an active session cookie while visiting a malicious site. This
vulnerability is also mitigated by restricting session cookies with the
SameSite attribute (see solution below).
Solution:
Install the latest version:
* If you use the GraphQL module v4 upgrade to GraphQL 8.x-4.6 [3]
* If you use the GraphQL module v3 upgrade to GraphQL 8.x-3.4 [4]
This vulnerability can also be mitigated by setting the SameSite attribute on
session cookies to Lax (recommended) or Strict. This might not be suitable
for sites that need to share the Drupal session cookie in some way with other
sites. Set the following in your site's services.yml file:
parameters:
session.storage.options:
# Session cookies are only used for backend admin accounts, so we
restrict
# the cookies to be used only from the backend origin. We don't use
"Strict"
# because that also removes cookies whenever an admin navigates from an
# email or chat app, which is inconvenient. See
#
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie#samesi…
cookie_samesite: Lax
Reported By:
* Sam Becker [5]
Fixed By:
* Sam Becker [6]
* Klaus Purer [7]
* Alexander Varwijk [8]
* Luis [9]
* Lee Rowlands [10] of the Drupal Security Team
Coordinated By:
* Greg Knaddison [11] of the Drupal Security Team
* Damien McKenna [12] of the Drupal Security Team
[1] https://www.drupal.org/project/graphql
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/graphql/releases/8.x-4.6
[4] https://www.drupal.org/project/graphql/releases/8.x-3.4
[5] https://www.drupal.org/user/1485048
[6] https://www.drupal.org/user/1485048
[7] https://www.drupal.org/user/262198
[8] https://www.drupal.org/user/1868952
[9] https://www.drupal.org/user/1022312
[10] https://www.drupal.org/user/395439
[11] https://www.drupal.org/user/36762
[12] https://www.drupal.org/user/108450