View online: https://www.drupal.org/sa-contrib-2017-082
Project: Permissions by Term [1]
Version: 8.x-1.x-dev
Date: 2017-November-08
Security risk: *Moderately critical* 14∕25
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
Description:
The Permissions by Term module extends Drupal by adding functionality for
restricting access to single nodes via taxonomy terms.
The module grants access to nodes that are being blocked by other node access
modules and that the Permissions by Term module does not intend to control.
Additionally, it grants access to unpublished nodes in node listings to users
who should not be able to see them. These problems lead to an access bypass
vulnerability.
This vulnerability is mitigated by the fact that it only occurs on sites that
either have another node access module (besides Permissions by Term) in use,
or that have node listings that are accessible to unprivileged users and that
don't directly filter out unpublished content.
Solution:
Install the latest version:
* If you use the Permissions by Term module for Drupal 8, upgrade to
Permissions by Term 8.x-1.35 [3]
Reported By:
* David Rothstein [4] of the Drupal Security Team
Fixed By:
* David Rothstein [5] of the Drupal Security Team
* Peter Majmesku [6] the module maintainer
Coordinated By:
* David Rothstein [7] of the Drupal Security Team
[1] https://www.drupal.org/project/permissions_by_term
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/permissions_by_term/releases/8.x-1.35
[4] https://www.drupal.org/u/david_rothstein
[5] https://www.drupal.org/u/david_rothstein
[6] https://www.drupal.org/u/peter-majmesku
[7] https://www.drupal.org/user/124982
View online: https://www.drupal.org/sa-contrib-2017-083
Project: Custom Permissions [1]
Version: 8.x-1.x-dev
Date: 2017-November-08
Security risk: *Moderately critical* 13∕25
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass
Description:
Custom Permissions is a lightweight module that allows permissions to be
created and managed through an administrative form.
When this module is in use, any user who is able to perform an action which
rebuilds some of Drupal's caches can trigger a scenario in which certain
pages protected by this module's custom permissions temporarily lose those
custom access controls, thereby leading to an access bypass vulnerability.
Solution:
Install the latest version:
* If you use the Custom Permissions module for Drupal 8, upgrade to Custom
Permissions 8.x-1.1 [3]
Reported By:
* Michael Koza [4]
* David Rothstein [5] of the Drupal Security Team
Fixed By:
* David Valdez [6] the module maintainer
* David Rothstein [7] of the Drupal Security Team
Coordinated By:
* David Rothstein [8] of the Drupal Security Team
[1] https://www.drupal.org/project/config_perms
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/config_perms/releases/8.x-1.1
[4] https://www.drupal.org/user/2110062
[5] https://www.drupal.org/user/124982
[6] http://drupal.org/u/gnuget
[7] https://www.drupal.org/user/124982
[8] https://www.drupal.org/user/124982
View online: https://www.drupal.org/sa-contrib-2017-081
Project: Automated Logout [1]
Version: 7.x-4.x-dev
Date: 2017-November-01
Security risk: *Moderately critical* 14∕25
AC:Basic/A:Admin/CI:Some/II:Some/E:Proof/TD:All [2]
Vulnerability: Cross Site Scripting
Description:
This module provides a site administrator the ability to log users out after
a specified time of inactivity. It is highly customizable and includes "site
policies" by role to enforce log out.
The module does not sufficiently filter user-supplied text that is stored in
the configuration, resulting in a persistent Cross Site Scripting
vulnerability (XSS).
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer autologout".
Solution:
Install the latest version:
* If you use the Automated Logout module for Drupal 7, upgrade to Automated
Logout 7.x-4.5 [3]
Reported By:
* Nancy Wichmann [4]
Fixed By:
* Nancy Wichmann [5]
* Ajit Shinde [6] the module maintainer
Coordinated By:
* David Snopek [7] of the Drupal Security Team
[1] https://www.drupal.org/project/autologout
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/autologout/releases/7.x-4.5
[4] https://www.drupal.org/u/nancydru
[5] https://www.drupal.org/u/nancydru
[6] https://www.drupal.org/u/ajits
[7] https://www.drupal.org/user/u/dsnopek
View online: https://www.drupal.org/sa-contrib-2017-079
Project: Brilliant Gallery [1]
Version: 7.x-1.x-dev
Date: 2017-October-25
Security risk: *Highly critical* 20∕25
AC:Basic/A:None/CI:All/II:All/E:Theoretical/TD:All [2]
Vulnerability: Multiple Vulnerabilities
Description:
This module enables you to display any number of galleries based on images
located in the files folder.
The module doesn't sufficiently sanitize various database queries which may
allow attackers to craft requests resulting in an SQL injection
vulnerability. This vulnerability could be exploited even by anonymous users
and could potentially allow them to take over the site.
The module doesn't sufficiently confirm a user's intent to save checklist
data, which allows for a cross-site request forgery (CSRF) exploit to be
executed by unprivileged users.
Some configuration fields are not filtered while rendered, resulting in a
cross-site scripting (XSS) vulnerability. This vulnerability is mitigated by
the fact that an attacker must have a role with the permission "Administer
Brilliant Gallery".
Solution:
Install the latest version:
* If you use the Brilliant Gallery module for Drupal 7, upgrade to
Brilliant
Gallery 7.x-1.10 [3]
Reported By:
* Jean-François Hovinne [4]
Fixed By:
* Tomas Fulopp [5], the module maintainer
Coordinated By:
* Greg Knaddison [6] of the Drupal Security Team
[1] https://www.drupal.org/project/brilliant_gallery
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/brilliant_gallery/releases/7.x-1.10
[4] https://www.drupal.org/u/jfhovinne
[5] https://www.drupal.org/u/vacilando
[6] https://www.drupal.org/u/greggles
View online: https://www.drupal.org/node/2910308
* Advisory ID: DRUPAL-SA-CONTRIB-2017-076
* Project: Skype Status [1] (third-party module)
* Version: 7.x
* Date: 2017-September-20
* Security risk: 14/25 ( Moderately Critical)
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
This module enables you to obtain the status for a user's Skype account
The module doesn't sufficiently sanitize the user input for their Skype ID.
This vulnerability is mitigated by the fact that an attacker must have an
account on the site and be allowed to edit/input their Skype ID.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Skype Status (skype_status) 7.x-2.x versions prior to 7.x-1.2.
Drupal core is not affected. If you do not use the contributed Skype Status
[4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Skype Status (skype_status) module for Drupal 7.x, upgrade
to Skype Status (skype_status) 7.x-1.2 [5].
Also see the Skype Status [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Tatár Balázs János (tatarbj) [7].
-------- FIXED BY
------------------------------------------------------------
* Tatár Balázs János (tatarbj) [8] provided patch.
* Nicholas Alipaz (nicholasalipaz) [9] the module maintainer.
-------- COORDINATED BY
------------------------------------------------------
* Michael Hess [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] https://www.drupal.org/project/skype_status
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/skype_status
[5] https://www.drupal.org/project/skype_status/releases/7.x-1.2
[6] https://www.drupal.org/project/skype_status
[7] https://www.drupal.org/user/649590
[8] https://www.drupal.org/user/649590
[9] https://www.drupal.org/u/nicholasalipaz
[10] https://www.drupal.org/u/mlhess
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity