View online: https://www.drupal.org/sa-contrib-2023-033
Project: Matomo Analytics [1] Date: 2023-August-02 Security risk: *Less critical* 8∕25 AC:Complex/A:Admin/CI:Some/II:None/E:Theoretical/TD:Default [2] Vulnerability: Cross Site Scripting
Affected versions: <1.22.0 Description: This module enables you to add the Matomo web statistics tracking system to your website.
The module does not check the Matomo JS code loaded on the website. So a user could configure the module to load JS from a malicious website.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer matomo" or "administer matomo tag manager" (D8+ only) to access the settings forms where this can be configured.
Solution: Install the latest version:
* If you use the Matomo Analytics module for Drupal 7, upgrade to Matomo Analytics 7.x-2.15 [3] * If you use the Matomo Analytics module for Drupal 8, upgrade to Matomo Analytics 8.x-1.22 [4]
Sites are encouraged to review which roles have that permission and which users have that role, to ensure that only trusted users have that permission.
Reported By: * Pierre Rudloff [5]
Fixed By: * Damien McKenna [6] of the Drupal Security Team * Carsten Logemann [7] * Florent Torregrosa [8] * Pierre Rudloff [9]
Coordinated By: * Neil Drumm [10] of the Drupal Security Team
[1] https://www.drupal.org/project/matomo [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/matomo/releases/7.x-2.15 [4] https://www.drupal.org/project/matomo/releases/8.x-1.22 [5] https://www.drupal.org/user/3611858 [6] https://www.drupal.org/user/108450 [7] https://www.drupal.org/user/218368 [8] https://www.drupal.org/user/2388214 [9] https://www.drupal.org/user/3611858 [10] https://www.drupal.org/user/3064