[Security-news] Stacks - Critical - Arbitrary PHP code execution - SA-CONTRIB-2018-001
security-news at drupal.org
security-news at drupal.org
Wed Jan 10 19:33:38 UTC 2018
View online: https://www.drupal.org/sa-contrib-2018-001
Project: Stacks [1]
Date: 2018-January-10
Security risk: *Critical* 18∕25
AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Arbitrary PHP code execution
Description:
This module enables content editors to create complex pages and layouts on
the fly without the help from a developer, using reusable widgets.
The module does not sufficiently filter values posted to its AJAX endpoint,
which leads to the instantiation of an arbitrary PHP class.
This vulnerability is mitigated by the fact that only sites with the Stacks -
Content Feed submodule enabled are affected.
Solution:
Install the latest version:
* If you use the Stacks module for Drupal 8.x, upgrade to Stacks 8.x-1.1
[3]
Reported By:
* Jean-François Hovinne [4]
Fixed By:
* Mauro Vigliotti [5] the module maintainer
Coordinated By:
* Michael Hess [6] of the Drupal Security Team
[1] https://www.drupal.org/project/stacks
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/stacks/releases/8.x-1.1
[4] https://www.drupal.org/user/77723
[5] https://www.drupal.org/user/176620
[6] https://www.drupal.org/u/mlhess
More information about the Security-news
mailing list