[Security-news] D8 Editor File upload - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2016-059

security-news at drupal.org security-news at drupal.org
Wed Nov 2 19:40:50 UTC 2016


View online: https://www.drupal.org/node/2824436

   * Advisory ID: DRUPAL-SA-CONTRIB-2016-059
   * Project: D8 Editor File upload [1]     (third-party module)
   * Version: 8.x
   * Date: 2016-November-02
   * Security risk: 12/25 ( Moderately Critical)
     AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
   * Vulnerability:

-------- DESCRIPTION
---------------------------------------------------------

This module enables you to upload files directly within the CKEditor and
create a link to download the given file.

The module doesn't sufficiently check the uploaded file extensions when the
allowed extensions list is not the default one.

This vulnerability is mitigated by the fact that an attacker must have a role
with the permission to use a text filter that enables this CKEditor plugin
and does not use the default allowed extensions.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * D8 Editor File Upload 8.x-1.x versions prior to 8.x-1.2.

Drupal core is not affected. If you do not use the contributed D8 Editor File
upload [4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the D8 Editor File Upload module for Drupal 8.x, upgrade to D8
     Editor File Upload 8.x-1.2 [5]

Also see the D8 Editor File upload [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Greg Dunlap (heyrocker) [7] of the Drupal Security Team
   * Tim Hayward (thtas) [8]

-------- FIXED BY
------------------------------------------------------------

   * Tim Hayward (thtas) [9]
   * Greg Dunlap (heyrocker) [10] of the Drupal Security Team

-------- COORDINATED BY
------------------------------------------------------

   * David Snopek [11] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].

Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and  securing your site [15].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]


[1] https://www.drupal.org/project/editor_file
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/editor_file
[5] https://www.drupal.org/project/editor_file/releases/8.x-1.2
[6] https://www.drupal.org/project/editor_file
[7] https://www.drupal.org/u/heyrocker
[8] https://www.drupal.org/u/thtas
[9] https://www.drupal.org/u/thtas
[10] https://www.drupal.org/u/heyrocker
[11] https://www.drupal.org/u/dsnopek
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity



More information about the Security-news mailing list