View online: https://www.drupal.org/sa-contrib-2019-067
Project: TableField [1] Version: 8.x-2.x-dev Date: 2019-September-18 Security risk: *Moderately critical* 12∕25 AC:None/A:User/CI:Some/II:None/E:Theoretical/TD:Default [2] Vulnerability: Access bypass
Description: This module allows you to attach tabular data to an entity.
There is insufficient access checking for users with the ability to "Export Tablefield Data as CSV". They can export data from unpublished nodes or otherwise inaccessible entities.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "Export Tablefield Data as CSV".
Solution: Install the latest version:
* If you use the Tablefield module for Drupal 8.x, upgrade to Tablefield 8.x-2.1 [3]
Also see the TableField [4] project page.
Reported By: * Mitch Portier [5]
Fixed By: * Mitch Portier [6] * Jen Lampton [7] * Martin Postma [8]
Coordinated By: * Chris McCafferty [9] of the Drupal Security Team * Greg Knaddison [10] of the Drupal Security Team * Drew Webber [11] of the Drupal Security Team
[1] https://www.drupal.org/project/tablefield [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/tablefield/releases/8.x-2.1 [4] https://www.drupal.org/project/tablefield [5] https://www.drupal.org/user/2284182 [6] https://www.drupal.org/user/2284182 [7] https://www.drupal.org/user/85586 [8] https://www.drupal.org/user/210402 [9] https://www.drupal.org/user/1850070 [10] https://www.drupal.org/user/36762 [11] https://www.drupal.org/user/255969