[Security-news] File Entity (fieldable files) - Moderately critical - Cross Site Scripting, Access bypass - SA-CONTRIB-2024-001
security-news at drupal.org
security-news at drupal.org
Wed Jan 10 18:38:00 UTC 2024
View online: https://www.drupal.org/sa-contrib-2024-001
Project: File Entity (fieldable files) [1]
Date: 2024-January-10
Security risk: *Moderately critical* 14∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross Site Scripting, Access bypass
Description:
File entity provides interfaces for managing files. It also extends the core
file entity, allowing files to be fieldable, grouped into types, viewed
(using display modes) and formatted using field formatters.
The module previously did not sufficiently validate files under the scenario
of a file replacement leading to multiple exploit paths including persistent
Cross Site Scripting.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission to edit files.
Solution:
Install the latest version:
* If you use the file_entity module for Drupal 7.x, upgrade to File Entity
7.x-2.38 [3].
Reported By:
* Caroline Boyden [4]
Fixed By:
* Joseph Olstad [5]
* Sascha Grossenbacher [6]
* Caroline Boyden [7]
Coordinated By:
* Damien McKenna [8] of the Drupal Security Team
* Greg Knaddison [9] of the Drupal Security Team
[1] https://www.drupal.org/project/file_entity
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/file_entity/releases/7.x-2.38
[4] https://www.drupal.org/user/657902
[5] https://www.drupal.org/user/1321830
[6] https://www.drupal.org/user/214652
[7] https://www.drupal.org/user/657902
[8] https://www.drupal.org/user/108450
[9] https://www.drupal.org/user/36762
More information about the Security-news
mailing list