[Security-news] The Better Mega Menu - Critical - Cross Site Request Forgery - SA-CONTRIB-2021-040
security-news at drupal.org
security-news at drupal.org
Wed Sep 22 18:06:41 UTC 2021
View online: https://www.drupal.org/sa-contrib-2021-040
Project: The Better Mega Menu [1]
Date: 2021-September-22
Security risk: *Critical* 15∕25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross Site Request Forgery
Description:
This module provides an admin interface for creating drop down menus that
combine Drupal menu items with rich media content.
The module does not use CSRF tokens to protect routes for saving menu
configurations.
This vulnerability can be exploited by an anonymous user.
Solution:
Install the latest version:
* If you use the TB Mega Menu module for Drupal 8.x, upgrade to TB MegaMenu
8.x-1.4 [3]
Reported By:
* Patrick Fey [4]
Fixed By:
* Patrick Fey [5]
* knaffles [6]
Coordinated By:
* Damien McKenna [7] of the Drupal Security Team
[1] https://www.drupal.org/project/tb_megamenu
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/tb_megamenu/releases/8.x-1.4
[4] https://www.drupal.org/user/998680
[5] https://www.drupal.org/user/998680
[6] https://www.drupal.org/user/1140512
[7] https://www.drupal.org/u/damienmckenna
More information about the Security-news
mailing list