[Security-news] Opigno group manager - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-027

security-news at drupal.org security-news at drupal.org
Wed Aug 7 17:53:19 UTC 2024


View online: https://www.drupal.org/sa-contrib-2024-027

Project: Opigno group manager [1]
Date: 2024-August-07
Security risk: *Critical* 16∕25
AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:All [2]
Vulnerability: Arbitrary PHP code execution

Affected versions: <3.1.1
Description: 
The Opigno group manager project is related to Opigno LMS distribution. It
allows to build the contents of learning paths, by combining together
modules, courses, and other activities, ordering them, and defining
conditional rules for the transitions from one step to the next one.

An administration form allows execution of arbitrary code.

This issue is mitigated by several factors. First, it requires the attacker
have the permission "update group learning_path". Additionally, it requires
several steps and depends on other data in the system to be in place.

Solution: 
Install the latest version:

   * If you use the opigno_group_manager module for Drupal 10.x, upgrade to
     opigno_group_manager 3.1.1 [3]

Reported By: 
   * catch [4] of the Drupal Security Team
   * Marcin Grabias [5]

Fixed By: 
   * Yurii Boichenko [6]

Coordinated By: 
   * Greg Knaddison [7] of the Drupal Security Team
   * Benji Fisher [8] of the Drupal Security Team


[1] https://www.drupal.org/project/opigno_group_manager
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/opigno_group_manager/releases/3.1.1
[4] https://www.drupal.org/user/35733
[5] https://www.drupal.org/user/1599440
[6] https://www.drupal.org/user/624860
[7] https://www.drupal.org/user/36762
[8] https://www.drupal.org/user/683300



More information about the Security-news mailing list