[Security-news] Opigno - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-032
security-news at drupal.org
security-news at drupal.org
Wed Aug 21 17:08:52 UTC 2024
View online: https://www.drupal.org/sa-contrib-2024-032
Project: Opigno [1]
Date: 2024-August-21
Security risk: *Critical* 16∕25
AC:Complex/A:User/CI:All/II:All/E:Theoretical/TD:Default [2]
Vulnerability: Arbitrary PHP code execution
Description:
The Opigno module is related to Opigno LMS distribution. Opigno Scorm
submodule exposes an API for extracting and handling SCORM packages.
Uploaded files were not sufficiently validated to prevent arbitrary file
uploads, which could lead to Remote Code Execution (RCE) and/or Cross Site
Scripting (XSS).
This vulnerability is mitigated by the fact that it affected only specific
activity types.
Solution:
Install the latest version:
* If you use the /opigno/ module, upgrade to opigno 7.x-1.23 [3]
Reported By:
* Yurii Boichenko [4]
* Marcin Grabias [5]
* catch [6] of the Drupal Security Team
Fixed By:
* Yurii Boichenko [7]
Coordinated By:
* Greg Knaddison [8] of the Drupal Security Team
* Juraj Nemec [9] of the Drupal Security Team
[1] https://www.drupal.org/project/opigno
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/opigno/releases/7.x-1.23
[4] https://www.drupal.org/user/624860
[5] https://www.drupal.org/user/1599440
[6] https://www.drupal.org/user/35733
[7] https://www.drupal.org/user/624860
[8] https://www.drupal.org/user/36762
[9] https://www.drupal.org/u/poker10
More information about the Security-news
mailing list