[Security-news] Matomo Analytics - Less critical - Cross Site Scripting - SA-CONTRIB-2023-033
security-news at drupal.org
security-news at drupal.org
Wed Aug 2 19:26:19 UTC 2023
View online: https://www.drupal.org/sa-contrib-2023-033
Project: Matomo Analytics [1]
Date: 2023-August-02
Security risk: *Less critical* 8∕25
AC:Complex/A:Admin/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Cross Site Scripting
Affected versions: <1.22.0
Description:
This module enables you to add the Matomo web statistics tracking system to
your website.
The module does not check the Matomo JS code loaded on the website. So a user
could configure the module to load JS from a malicious website.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer matomo" or "administer matomo tag manager"
(D8+ only) to access the settings forms where this can be configured.
Solution:
Install the latest version:
* If you use the Matomo Analytics module for Drupal 7, upgrade to Matomo
Analytics 7.x-2.15 [3]
* If you use the Matomo Analytics module for Drupal 8, upgrade to Matomo
Analytics 8.x-1.22 [4]
Sites are encouraged to review which roles have that permission and which
users have that role, to ensure that only trusted users have that permission.
Reported By:
* Pierre Rudloff [5]
Fixed By:
* Damien McKenna [6] of the Drupal Security Team
* Carsten Logemann [7]
* Florent Torregrosa [8]
* Pierre Rudloff [9]
Coordinated By:
* Neil Drumm [10] of the Drupal Security Team
[1] https://www.drupal.org/project/matomo
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/matomo/releases/7.x-2.15
[4] https://www.drupal.org/project/matomo/releases/8.x-1.22
[5] https://www.drupal.org/user/3611858
[6] https://www.drupal.org/user/108450
[7] https://www.drupal.org/user/218368
[8] https://www.drupal.org/user/2388214
[9] https://www.drupal.org/user/3611858
[10] https://www.drupal.org/user/3064
More information about the Security-news
mailing list