[Security-news] Config Terms - Critical - Access bypass - SA-CONTRIB-2022-047
security-news at drupal.org
security-news at drupal.org
Wed Jun 29 17:34:16 UTC 2022
View online: https://www.drupal.org/sa-contrib-2022-047
Project: Config Terms [1]
Date: 2022-June-29
Security risk: *Critical* 15∕25
AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:All [2]
Vulnerability: Access bypass
Description:
This module enables you to create and manage a version of taxonomy based on
configuration entities instead of content. This allows the terms,
vocabularies, and their structure to be exported, imported, and managed as
site configuration.
The module doesn't sufficiently check access for the edit and delete
operations. Users with "access content" permission can edit or delete any
term. The edit form may expose term data that users could not otherwise see,
since there is no term view route by default.
This vulnerability is slightly mitigated by the fact that an attacker must
have a role with the permission "access content", so may not be accessible to
anonymous users on all sites.
Solution:
Install the latest version:
* If you use the Config Terms module for Drupal 9.x, upgrade to Config
Terms
8.x-1.6 [3] or later
Reported By:
* Emil Johnsson [4]
Fixed By:
* Emil Johnsson [5]
* Justin Ludwig [6]
[1] https://www.drupal.org/project/config_terms
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/config_terms/releases/8.x-1.6
[4] https://www.drupal.org/user/1868992
[5] https://www.drupal.org/user/1868992
[6] https://www.drupal.org/user/669258
More information about the Security-news
mailing list