[Security-news] Search API attachments - Critical - Arbitrary PHP code execution - SA-CONTRIB-2021-034
security-news at drupal.org
security-news at drupal.org
Wed Sep 22 18:05:47 UTC 2021
View online: https://www.drupal.org/sa-contrib-2021-034
Project: Search API attachments [1]
Date: 2021-September-22
Security risk: *Critical* 15∕25
AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:Default [2]
Vulnerability: Arbitrary PHP code execution
Description:
This module enables you to extract the textual content of files for use on a
website, e.g. to display it or or use it in search indexes.
The module doesn't sufficiently protect the administrator-defined commands
which are executed on the server, which leads to post-authentication remote
code execution by a limited set of users.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer search_api". Sites are encouraged to review
which roles have that permission and which users have that role, to ensure
that only trusted users have that permission.
Solution:
Install the latest version:
* If you use the search_api_attachments module for Drupal 7.x, upgrade to
search_api_attachments 7.x-1.19 [3]
The 8.x branch does not have Security Coverage.
Reported By:
* Florent Torregrosa [4]
Fixed By:
* Damien McKenna [5] of the Drupal Security Team
* Ismaeil Abouljamal [6]
Coordinated By:
* Damien McKenna [7] of the Drupal Security Team
* Greg Knaddison [8] of the Drupal Security Team
[1] https://www.drupal.org/project/search_api_attachments
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/search_api_attachments/releases/7.x-1.19
[4] https://www.drupal.org/user/2388214
[5] https://www.drupal.org/user/108450
[6] https://www.drupal.org/user/514568
[7] https://www.drupal.org/u/damienmckenna
[8] https://www.drupal.org/u/greggles
More information about the Security-news
mailing list