View online: https://www.drupal.org/sa-contrib-2020-011
Project: Webform [1] Date: 2020-May-06 Security risk: *Critical* 17∕25 AC:Basic/A:Admin/CI:All/II:All/E:Theoretical/TD:All [2] Vulnerability: Remote Code Execution
Description: This module enables you to build forms and surveys in Drupal.
The module doesn't sufficiently filter webform element properties (attributes) under the scenario of editing a webform. Malicious user could craft such an attribute (#element_validate, for example) that would invoke execution of undesired PHP code.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "Edit own webform" (or "Edit any webform").
Solution: Install the latest version:
* If you use the Webform module for Drupal 8, upgrade to Webform 8.x-5.11 [3]
Also see the Webform [4] project page.
Reported By: * Jacob Rockowitz [5]
Fixed By: * Jacob Rockowitz [6] * Heine [7] of the Drupal Security Team * bucefal91 [8]
Coordinated By: * Greg Knaddison [9] of the Drupal Security Team
[1] https://www.drupal.org/project/webform [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/webform/releases/8.x-5.11 [4] https://www.drupal.org/project/webform [5] https://www.drupal.org/user/371407 [6] https://www.drupal.org/user/371407 [7] https://www.drupal.org/user/17943 [8] https://www.drupal.org/user/504128 [9] https://www.drupal.org/user/36762