View online: https://www.drupal.org/sa-contrib-2024-045
Project: Monster Menus [1] Date: 2024-October-09 Security risk: *Moderately critical* 13 ∕ 25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Uncommon [2] Vulnerability: Access bypass, Information Disclosure
Affected versions: <9.3.2 Description: This module enables you to group nodes within pages that have a highly-granular, distributed permissions structure.
A function which can be used by third-party code does not return valid data under certain rare circumstances. If the third-party code relies on this data to decide whether to grant access to content, it may grant more access than was intended.
This vulnerability is only present in sites that have custom code calling the mm_content_get_uids_in_group() function with a single UID of zero (0) in the second parameter.
Solution: Install the latest version:
* If you use the monster_menus module for Drupal 7.x, upgrade to monster_menus 7.x-1.34 [3]. * If you use the monster_menus module version *9.3.x*, upgrade to monster_menus 9.3.2 [4]. * If you use the monster_menus module version *9.4.0 or newer*, no change is needed.
Reported By: * Dan Wilga [5]
Fixed By: * Dan Wilga [6] * Ian McBride [7]
Coordinated By: * Greg Knaddison [8] of the Drupal Security Team * Juraj Nemec [9] of the Drupal Security Team * Damien McKenna [10] of the Drupal Security Team
[1] https://www.drupal.org/project/monster_menus [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/monster_menus/releases/7.x-1.34 [4] https://www.drupal.org/project/monster_menus/releases/9.3.2 [5] https://www.drupal.org/user/56892 [6] https://www.drupal.org/user/56892 [7] https://www.drupal.org/user/539500 [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/poker10 [10] https://www.drupal.org/u/damienmckenna