View online: https://www.drupal.org/sa-contrib-2022-064
Project: H5P - Create and Share Rich Content and Applications [1]
Date: 2022-December-14
Security risk: *Moderately critical* 12∕25
AC:Complex/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Remote Code Execution
Description:
This module enables you to create interactive content.
The module doesn't sufficiently stop path traversal attacks through zipped
filenames for the uploadable .h5p files.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "update h5p libraries". In addition, it is only
exploitable on Windows servers.
Solution:
Install the latest version:
* If you use the H5P module for Drupal 7.x, upgrade to H5P 7.x-1.51 [3]
Reported By:
Disclosed publicly.
Fixed By:
* Frode Petterson [4]
* paalj [5]
Coordinated By:
* Greg Knaddison [6] of the Drupal Security Team
[1] https://www.drupal.org/project/h5p
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/h5p/releases/7.x-1.51
[4] https://www.drupal.org/user/823190
[5] https://www.drupal.org/user/1091732
[6] https://www.drupal.org/user/36762
View online: https://www.drupal.org/sa-contrib-2022-063
Project: Entity Registration [1]
Date: 2022-December-07
Security risk: *Moderately critical* 13∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
Affected versions: >=7.1.0 <7.1.9
Description:
This module enables you to create registration entities related to nodes.
The module doesn't sufficiently restrict update access to a user's own
registrations.
This vulnerability is mitigated by the fact that an attacker must have the
"update own [registration type]" permission.
Solution:
Install the latest version:
* If you use the Entity Registration module for Drupal 7.x, upgrade to
Entity Registration 7.x-1.9 [3] release
*Note:* Sites that allow non-administrative users to manage registrations
because the users can update the registration host entity and have "update
own registration" permission for a given registration type, may need to give
those users the "administer own registration" permission for them to retain
the ability to manage registrations after installing this upgrade.
Reported By:
* Joël Pittet [4]
Fixed By:
* Joël Pittet [5]
* Maria Fisher [6]
* john.oltman [7]
Coordinated By:
* James Gilliland [8] of the Drupal Security Team
Reported at: 20 November 2022
[1] https://www.drupal.org/project/registration
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/registration/releases/7.x-1.9
[4] https://www.drupal.org/user/160302
[5] https://www.drupal.org/user/160302
[6] https://www.drupal.org/user/2210776
[7] https://www.drupal.org/user/699926
[8] https://www.drupal.org/user/48673
View online: https://www.drupal.org/sa-contrib-2022-060
Project: Social Base [1]
Date: 2022-November-30
Security risk: *Moderately critical* 14∕25
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
Affected versions: >=2.3 <2.3.4 || >=2.4 <2.4.3
Description:
The Social Base theme is designed as a base theme for Open Social. This base
theme holds has a lot of sensible defaults. It doesn't however contain much
styling. We expect developers to want to change this for their own project.
When content within the Open Social distribution is placed within a group
then the Socialbase theme renders a link to that group on the content view
page.
The link to groups was rendered without sufficiently checking that the
viewing user has access to the group. When creating public content in a
non-public group this could lead to exposing the existence of the group and
the group title to unauthorized users. The group itself remained
inaccessible.
Solution:
Install the latest version:
* If you use the Socialbase module theme for Drupal 8.x/9.x, upgrade to
Socialbase 2.4.3 [3]
* If you use the Socialbase module theme for Drupal 8.x/9.x, upgrade to
Socialbase 2.3.4 [4]
Reported By:
* Alexander Varwijk [5]
Fixed By:
* Alexander Varwijk [6]
* Ronald te Brake [7]
* Navneet Singh [8]
Coordinated By:
* Damien McKenna [9] of the Drupal Security Team
* Greg Knaddison [10] of the Drupal Security Team
[1] https://www.drupal.org/project/socialbase
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/socialbase/releases/2.4.3
[4] https://www.drupal.org/project/socialbase/releases/2.3.4
[5] https://www.drupal.org/user/1868952
[6] https://www.drupal.org/user/1868952
[7] https://www.drupal.org/user/2314038
[8] https://www.drupal.org/user/3200545
[9] https://www.drupal.org/user/108450
[10] https://www.drupal.org/user/36762
View online: https://www.drupal.org/sa-contrib-2022-058
Project: Twig Field Value [1]
Date: 2022-October-12
Security risk: *Moderately critical* 12∕25
AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
Description:
This module enables themers to get partial data from field render arrays. It
gives them more control over the output without drilling deep into the render
array or using preprocess functions.
The module doesn't sufficiently apply access restrictions when using the
filters field_label, field_value, field_raw and field_target_entity.
This vulnerability is mitigated by the fact that these filters must be used
in combination with either unpublished content or access control modules.
Solution:
Install the latest version:
* If you use the Twig Field Value module version 8.x-1.x or 2.0.x, upgrade
to Twig Field Value 2.0.1 [3]
Reported By:
* Erik Stielstra [4]
Fixed By:
* Erik Stielstra [5]
Coordinated By:
* Damien McKenna [6] of the Drupal Security Team
* Greg Knaddison [7] of the Drupal Security Team
* Ivo Van Geertruyen [8] of the Drupal Security Team
[1] https://www.drupal.org/project/twig_field_value
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/twig_field_value/releases/2.0.1
[4] https://www.drupal.org/user/73854
[5] https://www.drupal.org/user/73854
[6] https://www.drupal.org/user/108450
[7] https://www.drupal.org/user/36762
[8] https://www.drupal.org/user/383424