[Security-news] Opigno module - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-028
security-news at drupal.org
security-news at drupal.org
Wed Aug 7 17:53:06 UTC 2024
View online: https://www.drupal.org/sa-contrib-2024-028
Project: Opigno module [1]
Date: 2024-August-07
Security risk: *Critical* 15∕25
AC:Complex/A:User/CI:All/II:All/E:Theoretical/TD:Uncommon [2]
Vulnerability: Arbitrary PHP code execution
Affected versions: <3.1.2
Description:
The Opigno module is related to Opigno LMS distribution. It implements the
module entity, that is a sub-part of a training.
In the opigno_module module, uploaded files were not sufficiently validated
to prevent arbitrary file uploads, which could lead to Remote Code Execution
(RCE) and/or Cross Site Scripting (XSS).
This vulnerability is mitigated by the fact that it requires the attacker
have a role with the permission "create opigno tincan activities".
Solution:
Install the latest version:
* If you use the /opigno_module/ module, upgrade to opigno_module >= 3.1.2
[3]
Reported By:
* Marcin Grabias [4]
* catch [5] of the Drupal Security Team
Fixed By:
* Yurii Boichenko [6]
* Axel Minck [7]
* Yuriy Korzhov [8]
* Andrii Aleksandrov [9]
* catch [10] of the Drupal Security Team
Coordinated By:
* Greg Knaddison [11] of the Drupal Security Team
[1] https://www.drupal.org/project/opigno_module
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/opigno_module/releases/3.1.2
[4] https://www.drupal.org/user/1599440
[5] https://www.drupal.org/user/35733
[6] https://www.drupal.org/user/624860
[7] https://www.drupal.org/user/1065700
[8] https://www.drupal.org/user/3477971
[9] https://www.drupal.org/user/3368060
[10] https://www.drupal.org/user/35733
[11] https://www.drupal.org/user/36762
More information about the Security-news
mailing list