View online: https://www.drupal.org/sa-contrib-2019-038
Project: Simple hierarchical select [1]
Date: 2019-March-13
Security risk: *Moderately critical* 10∕25
AC:Basic/A:User/CI:None/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross site request forgery
Description:
Simple hierarchical select defines a new form widget for taxonomy fields to
select a term by "browsing" through the vocabularies hierarchy. It also
allows users to create new taxonomy terms using its widget directly in the
node form.
Version 7.x of Simple hierarchical select doesn't sufficiently checks
permission when creating new terms so attackers can create arbitrary taxonomy
terms in any vocabularies the victim has access to..
This vulnerability is mitigated by the fact that an attacker must trick a
user with permission to create terms to visit a specially prepared web page
controlled by the attacker.
Solution:
Install the latest version:
* If you use /Simple hierarchical select/ prior to 7.x-1.7 update to
7.x-1.8
[3]
* If you are unable to update, simply deactivate the option to allow
creating new terms in the widget settings.
Note that the Drupal 8 version of this module is unaffected.
Reported By:
* Ayesh Karunaratne [4]
Fixed By:
* Ayesh Karunaratne [5]
* Stefan Borchert [6]
* Greg Knaddison [7] of the Drupal Security Team
Coordinated By:
* Greg Knaddison [8] of the Drupal Security Team
[1] https://www.drupal.org/project/shs
[2] https://www.drupal.org/security-team/risk-levels
[3] node/3039685
[4] https://www.drupal.org/user/796148
[5] https://www.drupal.org/user/796148
[6] https://www.drupal.org/user/36942
[7] https://www.drupal.org/user/36762
[8] https://www.drupal.org/user/36762
View online: https://www.drupal.org/sa-contrib-2019-033
Project: EU Cookie Compliance [1]
Version: 7.x-1.x-dev8.x-1.x-dev
Date: 2019-March-06
Security risk: *Critical* 15∕25
AC:None/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross site scripting
Description:
This module addresses the General Data Protection Regulation (GDPR) that came
into effect 25th May 2018, and the EU Directive on Privacy and Electronic
Communications from 2012. It provides a banner where you can gather consent
from the user when the website stores cookies on their computer or otherwise
handles their personal information.
The module doesn't sufficiently sanitize data for some interface labels and
strings shown in the cookie policy banner, opening up possibility of Cross
Site Scripting exploits that can be created by somebody that has access to
the admin interface of the module.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "Administer EU Cookie Compliance banner". For Drupal 8,
the vulnerability also requires access to a text format that doesn't sanitize
data.
Solution:
Install the latest version:
* If you use EU Cookie Compliance module for Drupal 7.x, upgrade to EU
Cookie Compliance 7.x-1.26 [3]
* If you use EU Cookie Compliance module for Drupal 8.x, upgrade to EU
Cookie Compliance 8.x-1.3 [4]
Also see the EU Cookie Compliance [5] project page.
Reported By:
* Yonatan Offek [6]
Fixed By:
* Luigi Guevara [7]
* Sven Berg Ryen [8]
Coordinated By:
* Greg Knaddison [9] of the Drupal Security Team
* Michael Hess [10] of the Drupal Security Team
[1] https://www.drupal.org/project/eu_cookie_compliance
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/eu_cookie_compliance/releases/7.x-1.26
[4] https://www.drupal.org/project/eu_cookie_compliance/releases/8.x-1.3
[5] https://www.drupal.org/project/eu_cookie_compliance
[6] https://www.drupal.org/user/194009
[7] https://www.drupal.org/user/699418
[8] https://www.drupal.org/user/667244
[9] https://www.drupal.org/user/36762
[10] https://www.drupal.org/user/102818