[Security-news] Drupal core - Moderately critical - Cross Site Request Forgery - SA-CORE-2021-007

security-news at drupal.org security-news at drupal.org
Wed Sep 15 17:14:49 UTC 2021


View online: https://www.drupal.org/sa-core-2021-007

Project: Drupal core [1]
Date: 2021-September-15
Security risk: *Moderately critical* 14∕25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross Site Request Forgery

CVE IDs: CVE-2020-13674
Description: 
The QuickEdit module does not properly validate access to routes, which could
allow cross-site request forgery under some circumstances and lead to
possible data integrity issues.

Sites are only affected if the QuickEdit module (which comes with the
Standard profile) is installed. Removing the "access in-place editing"
permission from untrusted users *will not* fully mitigate the vulnerability.

This advisory is not covered by Drupal Steward [3].

Solution: 
Install the latest version:

   * If you are using Drupal 9.2, update to Drupal 9.2.6 [4].
   * If you are using Drupal 9.1, update to Drupal 9.1.13 [5].
   * If you are using Drupal 8.9, update to Drupal 8.9.19 [6].

Versions of Drupal 8 prior to 8.9.x and versions of Drupal 9 prior to 9.1.x
are end-of-life and do not receive security coverage.

Drupal 7 core does not include the QuickEdit module and therefore is not
affected.

Uninstalling the QuickEdit module will also mitigate the vulnerability. Site
owners may wish to consider this option as the QuickEdit module will be
removed from core in Drupal 10 [7].

Reported By: 
   * Samuel Mortenson [8]

Fixed By: 
   * Wim Leers [9]
   * Greg Knaddison [10] of the Drupal Security Team
   * Jess  [11] of the Drupal Security Team
   * Lee Rowlands [12] of the Drupal Security Team
   * Vijay Mani [13]
   * Heine [14] of the Drupal Security Team
   * Alex Bronstein [15] of the Drupal Security Team
   * Adam G-H [16]
   * Drew Webber [17] of the Drupal Security Team
   * Théodore Biadala [18]


[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/steward
[4] https://www.drupal.org/project/drupal/releases/9.2.6
[5] https://www.drupal.org/project/drupal/releases/9.1.13
[6] https://www.drupal.org/project/drupal/releases/8.9.19
[7] https://www.drupal.org/node/3227039
[8] https://www.drupal.org/user/2582268
[9] https://www.drupal.org/user/99777
[10] https://www.drupal.org/user/36762
[11] https://www.drupal.org/user/65776
[12] https://www.drupal.org/user/395439
[13] https://www.drupal.org/user/93488
[14] https://www.drupal.org/user/17943
[15] https://www.drupal.org/user/78040
[16] https://www.drupal.org/user/205645
[17] https://www.drupal.org/user/255969
[18] https://www.drupal.org/user/598310



More information about the Security-news mailing list