View online: https://www.drupal.org/node/2666446
* Advisory ID: DRUPAL-SA-CONTRIB-2016-pending
* Project: Embedded Media Field [1] (third-party module)
* Version: 6.x
* Date: 2016-February-10
* Security risk: 19/25 ( Critical)
AC:Complex/A:None/CI:All/II:All/E:Theoretical/TD:All [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
This module enables you to to display video, image, and audio files from
various third party providers
The module doesn't sufficiently sanitize path arguments under certain
scenarios.
This vulnerability is mitigated by the fact that an attacker must be able to
trick an administrator into visiting a carefully crafted URL.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Embedded Media Field 6.x-1.x all versions.
* Embedded Media Field 6.x-2.x versions prior to 6.x-2.7.
Versions of Embedded Media Field for Drupal 7 are not affected.
Drupal core is not affected. If you do not use the contributed Embedded Media
Field [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Embedded Media Field module for Drupal 6.x, upgrade to
Embedded Media Field 6.x-2.7 [5]
Also see the Embedded Media Field [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Cash Williams (cashwilliams) [7]
-------- FIXED BY
------------------------------------------------------------
* Dave Hansen-Lange (dalin) [8]
-------- COORDINATED BY
------------------------------------------------------
* Michael Hess [9] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [14]
[1] https://www.drupal.org/project/emfield
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/emfield
[5] https://www.drupal.org/node/2665632
[6] https://www.drupal.org/project/emfield
[7] https://www.drupal.org/u/cashwilliams
[8] https://www.drupal.org/u/dalin
[9] https://www.drupal.org/u/mlhess
[10] https://www.drupal.org/contact
[11] https://www.drupal.org/security-team
[12] https://www.drupal.org/writing-secure-code
[13] https://www.drupal.org/security/secure-configuration
[14] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2657654
* Advisory ID: DRUPAL-SA-CONTRIB-2016-003
* Project: Open Atrium [1] (third-party module)
* Version: 7.x
* Date: 2016-January-27
* Security risk: 13/25 ( Moderately Critical)
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Uncommon [2]
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
Open Atrium allows you to control access via a hierarchy of public and
private spaces and sub-spaces. If a public sub-space is created within a
private parent-space, the content nodes of the public sub-space are
accessible to users who are not members of the parent private space.
This issue only affects sites that use private sub-spaces.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Open Atrium 7.x-2.x versions prior to 7.x-2.53.
Drupal core is not affected. If you do not use the contributed Open Atrium
[4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
* Upgrade to the latest version, 7.x-2.53 [5]
If you are not able to fully upgrade to the latest version, ensure private
sub-spaces are directly marked as private and are not seen publicly in a
private parent space.
Also see the Open Atrium [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Mike Potter [7], Open Atrium maintainer.
-------- FIXED BY
------------------------------------------------------------
* Mike Potter [8], Open Atrium maintainer.
* Scott Henry [9], Open Atrium co-maintainer.
-------- COORDINATED BY
------------------------------------------------------
* Hunter Fox [10] of the Drupal Security Team
* Ben Jeavons [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] https://www.drupal.org/project/openatrium
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/openatrium
[5] https://www.drupal.org/node/2657640
[6] https://www.drupal.org/project/openatrium
[7] https://www.drupal.org/u/mpotter
[8] https://www.drupal.org/u/mpotter
[9] https://www.drupal.org/u/scottalan
[10] https://www.drupal.org/user/426416
[11] https://www.drupal.org/u/coltrane
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2649800
* Advisory ID: DRUPAL-SA-CONTRIB-2016-002
* Project: RedHen CRM [1] (third-party module)
* Version: 7.x
* Date: 2016-January-13
* Security risk: 13/25 ( Moderately Critical)
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Redhen set of modules allows you to build a CRM features in a Drupal
site.
When rendering individual Contacts, this module does not properly filter the
certain data prior to display. When rendering listing of notes or engagement
scores, these modules do not properly filter certain data before display.
This vulnerability is mitigated by the fact that an attacker must have an
authenticated user account with access to edit a contact, administer
engagement scores, or administer taxonomies.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Redhen 7.x-1.x versions prior to 7.x-1.11.
Drupal core is not affected. If you do not use the contributed RedHen CRM [4]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the RedHen module for Drupal 7.x, upgrade to Redhen 7.x-1.11
[5]
Workaround (if you are unable to update the module immediately):
* In the display settings for your Redhen Contact Types
(admin/structure/redhen/contact_types), hide "name" on all display modes.
* Restrict access to "Administer Engagement Scores" and "Administer
Taxonomies" to trusted users.
Also see the RedHen CRM [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Mikko Rantanen [7]
* Gabe Carleton-Barnes [8], a module maintainer
* Greg Knaddison [9] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Jaymz Rhime [10], a module maintainer
* Gabe Carleton-Barnes [11], a module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [12] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [13].
Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and securing your site [16].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [17]
[1] https://www.drupal.org/project/redhen
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/redhen
[5] https://www.drupal.org/node/2649780
[6] https://www.drupal.org/project/redhen
[7] https://www.drupal.org/user/1004738
[8] https://www.drupal.org/user/1682976
[9] https://www.drupal.org/user/36762
[10] https://www.drupal.org/user/3181097
[11] https://www.drupal.org/user/1682976
[12] https://www.drupal.org/user/36762
[13] https://www.drupal.org/contact
[14] https://www.drupal.org/security-team
[15] https://www.drupal.org/writing-secure-code
[16] https://www.drupal.org/security/secure-configuration
[17] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2645350
* Advisory ID: DRUPAL-SA-CONTRIB-2016-001
* Project: Field Group [1] (third-party module)
* Version: 7.x
* Date: 2016-January-06
* Security risk: 12/25 ( Moderately Critical)
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:Default [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
Field Group module enables you to group fields on entity forms and entity
displays.
When adding a HTML element as group, the user has the option to add custom
HTML attributes on the group. Via this option, a malicious user can embed
scripts within the page, resulting in a Cross-site Scripting (XSS)
vulnerability.
This vulnerability is mitigated by the fact that an attacker has to be able
to configure field display settings, which usually needs a higher level
permission such as /Administer vocabularies and terms/.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Field Group 7.x-1.x versions prior to 7.x-1.5.
Drupal core is not affected. If you do not use the contributed Field Group
[4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Field Group module for Drupal 7.x, upgrade to Field Group
7.x-1.5 [5]
Also see the Field Group [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Pere Orga [7] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Nils Destoop [8], module maintainer
* Pere Orga [9] of the Drupal Security Team
-------- COORDINATED BY
------------------------------------------------------
* David Snopek [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] https://www.drupal.org/project/field_group
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/field_group
[5] https://www.drupal.org/node/2644832
[6] https://www.drupal.org/project/field_group
[7] https://www.drupal.org/u/pere-orga
[8] https://www.drupal.org/user/361625
[9] https://www.drupal.org/u/pere-orga
[10] https://www.drupal.org/user/266527
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2636502
* Advisory ID: DRUPAL-SA-CONTRIB-2015-175
* Project: Block Class [1] (third-party module)
* Version: 7.x
* Date: 2015-December-16
* Security risk: 19/25 ( Critical)
AC:None/A:Admin/CI:All/II:All/E:Theoretical/TD:All [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
This module enables you to add custom classes to blocks.
The module doesn't sufficiently scrub class names written by a malicious
block class administrator.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "Administer block classes".
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* block_class 7.x-2.x versions prior to 7.x-2.2.
Drupal core is not affected. If you do not use the contributed Block Class
[4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the block_class module for Drupal 7.x, upgrade to block_class
7.x-2.2 [5]
Also see the Block Class [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Neil Drumm [7] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Berend de Boer [8] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Ben Dougherty [9] of the Drupal Security Team
* Owen Barton [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] https://www.drupal.org/project/block_class
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/block_class
[5] https://www.drupal.org/node/2636498
[6] https://www.drupal.org/project/block_class
[7] https://www.drupal.org/user/23
[8] https://www.drupal.org/user/143552
[9] https://www.drupal.org/user/1852732
[10] https://www.drupal.org/user/19668
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2636380
* Advisory ID: DRUPAL-SA-CONTRIB-2015-174
* Project: Open Atrium [1] (third-party module)
* Version: 7.x
* Date: 2015-December-16
* Security risk: 17/25 ( Critical)
AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
Open Atrium distribution enables you to create an intranet.
Open Atrium Core module doesn't sufficiently sanitize some user supplied
text, leading to a reflected Cross Site Scripting vulnerability (XSS).
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Open Atrium distribution 7.x-2.x versions prior to 7.x-2.51
* Open Atrium Core module 7.x-2.x versions prior to 7.x-2.66
Drupal core is not affected. If you do not use the contributed Open Atrium
[4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
If you use the Open Atrium distribution for Drupal 7.x:
* Upgrade to Open Atrium 7.x-2.51
If you use the Open Atrium Core module for Drupal 7.x:
* Upgrade to Open Atrium Core 7.x-2.66 [5]
Also see the Open Atrium [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* kris84 [7]
* jbylsma [8]
-------- FIXED BY
------------------------------------------------------------
* kris84 [9]
* Mike Potter [10], a module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Pere Orga [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] https://www.drupal.org/project/openatrium
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/openatrium
[5] https://www.drupal.org/node/2636350
[6] https://www.drupal.org/project/openatrium
[7] https://www.drupal.org/user/142812
[8] https://www.drupal.org/u/jbylsma
[9] https://www.drupal.org/user/142812
[10] https://www.drupal.org/user/616192
[11] https://www.drupal.org/u/pere-orga
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2636344
* Advisory ID: DRUPAL-SA-CONTRIB-2015-172
* Project: Values [1] (third-party module)
* Version: 7.x
* Date: 2015-December-16
* Security risk: 16/25 ( Critical)
AC:Basic/A:Admin/CI:All/II:All/E:Proof/TD:Uncommon [2]
* Vulnerability: Arbitrary PHP code execution
-------- DESCRIPTION
---------------------------------------------------------
This module enables you to create key|value pairs for use in list fields,
webforms etc.
The module includes an import page that runs eval() on an exported code block
(ctools), but the permission for the page does not warn about security
concerns of importing raw php code like this (trusted permission).
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "import value sets".
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Values 7.x-1.x versions prior to 7.x-1.2.
Drupal core is not affected. If you do not use the contributed Values [4]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the values module for Drupal 7.x, upgrade to Values 7.x-1.2
[5]
Also see the Values [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Sam Becker [7]
-------- FIXED BY
------------------------------------------------------------
* Chris Eastwood [8] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [9] of the Drupal Security Team
* Michael Hess [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] https://www.drupal.org/project/values
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/values
[5] https://www.drupal.org/node/2622534
[6] https://www.drupal.org/project/values
[7] https://www.drupal.org/user/1485048
[8] https://www.drupal.org/user/823702
[9] https://www.drupal.org/u/greggles
[10] https://www.drupal.org/u/mlhess
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/PSA-2015-001
* Advisory ID: DRUPAL-PSA-CONTRIB-2015-001
* Project: Drupal core [1]
* Version: 6.x, 7.x, 8.x
* Date: 2015-December-02
* Security risk: 17/25 ( Critical)
AC:Basic/A:None/CI:Some/II:Some/E:Exploit/TD:Uncommon [2]
* Vulnerability: Multiple vulnerabilities
-------- DESCRIPTION
---------------------------------------------------------
When a Drupal installation is not completed past the database configuration
phase and install.php is left accessible via the internet, any visitor to
install.php may complete the installation with a remote database of their
selection.
Such a malicious user may use the remote database to execute code on the
server.
The above also applies to sites that react to certain hostnames with an
installation page and have a sites folder owned or writable by the webserver.
Such inadvertent multisites may occur when no default settings.php is present
and directory permissions are misconfigured.
These vulnerabilities are mitigated by setting directory and/or file
permissions that prevent the webserver from writing to the sites/default/ and
sites/ directories.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
Drupal 6 core, Drupal 7 core and Drupal 8 core.
-------- SOLUTION
------------------------------------------------------------
Always complete installations fully on servers exposed to the internet.
Ensure that the webserver does not own the sites folder and cannot write to
the sites folder.
Consider removing install.php after installation.
Consider installing and automating the execution of Security review [4] which
will identify weak file permissions and ownership.
Also see the Drupal core [5] project page.
-------- COORDINATED BY
------------------------------------------------------
* Heine Deelstra [6] of the Drupal security team
* Greg Knaddison [7] of the Drupal security team
* Michael Hess [8] of the Drupal security team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [9].
Learn more about the Drupal Security team and their policies [10], writing
secure code for Drupal [11], and securing your site [12].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [13]
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/security_review
[5] https://www.drupal.org/project/drupal
[6] https://www.drupal.org/u/heine
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/u/mlhess
[9] https://www.drupal.org/contact
[10] https://www.drupal.org/security-team
[11] https://www.drupal.org/writing-secure-code
[12] https://www.drupal.org/security/secure-configuration
[13] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2627638
* Advisory ID: DRUPAL-SA-CONTRIB-2015-171
* Project: Token Insert Entity [1] (third-party module)
* Version: 7.x
* Date: 2015-December-02
* Security risk: 10/25 ( Moderately Critical)
AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:Default [2]
* Vulnerability: Access bypass, Information Disclosure
-------- DESCRIPTION
---------------------------------------------------------
This module offers a WYSIWYG button to embed rendered entities in fields
using a WYSIWYG (normally the body of a node).
There is a vulnerability because a user that can create or edit content and
has the "insert entity token" permission can insert tokens relating to e.g.
an unpublished node and allow any (including anonymous) users to see this
rendered node embedded into the main node.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Token Insert Entity 7.x-1.x versions prior to 7.x-1.1.
Drupal core is not affected. If you do not use the contributed Token Insert
Entity [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Token Insert Entity module for Drupal 7.x, upgrade to
Token
Insert Entity 7.x-1.1 [5]
Also see the Token Insert Entity [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* killes [7] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Juampy NR [8] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Peter Wolanin [9] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [14]
[1] https://www.drupal.org/project/token_insert_entity
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/token_insert_entity
[5] https://www.drupal.org/node/2571905
[6] https://www.drupal.org/project/token_insert_entity
[7] https://www.drupal.org/user/227
[8] https://www.drupal.org/user/682736
[9] https://www.drupal.org/user/49851
[10] https://www.drupal.org/contact
[11] https://www.drupal.org/security-team
[12] https://www.drupal.org/writing-secure-code
[13] https://www.drupal.org/security/secure-configuration
[14] https://twitter.com/drupalsecurity