[Security-news] Webform - Critical - Remote Code Execution - SA-CONTRIB-2020-011

security-news at drupal.org security-news at drupal.org
Wed May 6 17:25:07 UTC 2020


View online: https://www.drupal.org/sa-contrib-2020-011

Project: Webform [1]
Date: 2020-May-06
Security risk: *Critical* 17∕25
AC:Basic/A:Admin/CI:All/II:All/E:Theoretical/TD:All [2]
Vulnerability: Remote Code Execution

Description: 
This module enables you to build forms and surveys in Drupal.

The module doesn't sufficiently filter webform element properties
(attributes) under the scenario of editing a webform. Malicious user could
craft such an attribute (#element_validate, for example) that would invoke
execution of undesired PHP code.

This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "Edit own webform" (or "Edit any webform").

Solution: 
Install the latest version:

   * If you use the Webform module for Drupal 8, upgrade to Webform 8.x-5.11
     [3]

Also see the Webform [4] project page.

Reported By: 
   * Jacob Rockowitz  [5]

Fixed By: 
   * Jacob Rockowitz  [6]
   * Heine  [7] of the Drupal Security Team
   * bucefal91  [8]

Coordinated By: 
   * Greg Knaddison [9] of the Drupal Security Team


[1] https://www.drupal.org/project/webform
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/webform/releases/8.x-5.11
[4] https://www.drupal.org/project/webform
[5] https://www.drupal.org/user/371407
[6] https://www.drupal.org/user/371407
[7] https://www.drupal.org/user/17943
[8] https://www.drupal.org/user/504128
[9] https://www.drupal.org/user/36762



More information about the Security-news mailing list