[Security-news] Drupal core - Critical - Access bypass - SA-CORE-2019-008

security-news at drupal.org security-news at drupal.org
Wed Jul 17 16:35:55 UTC 2019


View online: https://www.drupal.org/sa-core-2019-008

Project: Drupal core [1]
Date: 2019-July-17
Security risk: *Critical* 17∕25
AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass

CVE IDs: CVE-2019-6342
Description: 
In Drupal 8.7.4, when the experimental [3] Workspaces module is enabled, an
access bypass condition is created.

This can be mitigated by disabling the Workspaces module. It does not affect
any release other than Drupal 8.7.4.

Drupal 8.7.3 and earlier, Drupal 8.6.x and earlier, and Drupal 7.x are *not*
affected.

Solution: 
If the site is running Drupal 8.7.4, upgrade to Drupal 8.7.5.

*Note, manual step needed.* For sites with the Workspaces module enabled,
update.php needs to run to ensure a required cache clear. If there is a
reverse proxy cache or content delivery network (e.g. Varnish, CloudFlare) it
is also advisable to clear these as well.

Reported By: 
   * Dave Botsch  [4]

Fixed By: 
   * Michael Hess  [5] of the Drupal Security Team
   * Jess   [6] of the Drupal Security Team
   * Greg Knaddison  [7] of the Drupal Security Team
   * Chris McCafferty  [8] of the Drupal Security Team
   * Neil Drumm  [9] of the Drupal Security Team
   * Alex Pott  [10] of the Drupal Security Team
   * Andrei Mateescu  [11]


[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/core/experimental#beta
[4] https://www.drupal.org/user/3534164
[5] https://www.drupal.org/user/102818
[6] https://www.drupal.org/user/65776
[7] https://www.drupal.org/user/36762
[8] https://www.drupal.org/user/1850070
[9] https://www.drupal.org/user/3064
[10] https://www.drupal.org/user/157725
[11] https://www.drupal.org/user/729614



More information about the Security-news mailing list