View online: https://www.drupal.org/sa-contrib-2024-027
Project: Opigno group manager [1] Date: 2024-August-07 Security risk: *Critical* 16∕25 AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:All [2] Vulnerability: Arbitrary PHP code execution
Affected versions: <3.1.1 Description: The Opigno group manager project is related to Opigno LMS distribution. It allows to build the contents of learning paths, by combining together modules, courses, and other activities, ordering them, and defining conditional rules for the transitions from one step to the next one.
An administration form allows execution of arbitrary code.
This issue is mitigated by several factors. First, it requires the attacker have the permission "update group learning_path". Additionally, it requires several steps and depends on other data in the system to be in place.
Solution: Install the latest version:
* If you use the opigno_group_manager module for Drupal 10.x, upgrade to opigno_group_manager 3.1.1 [3]
Reported By: * catch [4] of the Drupal Security Team * Marcin Grabias [5]
Fixed By: * Yurii Boichenko [6]
Coordinated By: * Greg Knaddison [7] of the Drupal Security Team * Benji Fisher [8] of the Drupal Security Team
[1] https://www.drupal.org/project/opigno_group_manager [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/opigno_group_manager/releases/3.1.1 [4] https://www.drupal.org/user/35733 [5] https://www.drupal.org/user/1599440 [6] https://www.drupal.org/user/624860 [7] https://www.drupal.org/user/36762 [8] https://www.drupal.org/user/683300