[Security-news] Xsendfile - Moderately critical - Access bypass - SA-CONTRIB-2023-053
security-news at drupal.org
security-news at drupal.org
Wed Nov 29 18:08:05 UTC 2023
View online: https://www.drupal.org/sa-contrib-2023-053
Project: Xsendfile [1]
Date: 2023-November-29
Security risk: *Moderately critical* 13∕25
AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:All [2]
Vulnerability: Access bypass
Affected versions: <1.2.0
Description:
The Xsendfile module enables fast transfer for private files in Drupal.
In order to control private file downloads, the module overrides
ImageStyleDownloadController, for which a vulnerability was disclosed in
SA-CORE-2023-005 [3]. The Xsendfile module was still based on an insecure
version of ImageStyleDownloadController.
Solution:
Install the latest version:
* If you use the Xsendfile module for Drupal 8.x, upgrade to Xsendfile
8.x-1.2. [4]
Reported By:
* Pierre Rudloff [5]
Fixed By:
* Damien Norris [6]
* Bruno De Bondt [7]
* Pierre Rudloff [8]
* Conrad Lara [9]
Coordinated By:
* Greg Knaddison [10] of the Drupal Security Team
[1] https://www.drupal.org/project/xsendfile
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/sa-core-2023-005
[4] https://www.drupal.org/project/xsendfile/releases/8.x-1.2
[5] https://www.drupal.org/user/3611858
[6] https://www.drupal.org/user/97688
[7] https://www.drupal.org/user/33235
[8] https://www.drupal.org/user/3611858
[9] https://www.drupal.org/user/1790054
[10] https://www.drupal.org/user/36762
More information about the Security-news
mailing list