![]() ![]() Only sites that have the read_only set to FALSE under ttings config are vulnerable. ![]() This issue affects: Drupal Drupal Core 7.x versions prior to 7.73 8.8.x versions prior to 8.8.10 8.9.x versions prior to 8.9.6 9.0.x versions prior to 9.0.6.Īccess bypass vulnerability in Drupal Core allows JSON:API when JSON:API is in read/write mode. Drupal AJAX API does not disable JSONP by default, allowing for an XSS attack. This issue affects Drupal Core8.8.X versions prior to 8.8.10 8.9.X versions prior to 8.9.6 9.0.X versions prior to 9.0.6.Ĭross-site scripting vulnerability in Drupal Core. ![]() This vulnerability is mitigated by the fact that sites are only vulnerable if they have installed the experimental Workspaces module. An attacker might be able to see content before the site owner intends people to see the content. The Workspaces module doesn't sufficiently check access permissions when switching workspaces, leading to an access bypass vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10 8.9.x versions prior to 8.9.6 9.0.x versions prior to 9.0.6.Īccess bypass vulnerability in of Drupal Core Workspaces allows an attacker to access data without correct permissions. 8.9.x versions prior to 8.9.6 9.0.x versions prior to 9.0.6.Īccess Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10 8.9.x versions prior to 8.9.6 9.0.x versions prior to 9.0.6.Ĭross-site Scripting (XSS) vulnerability in ckeditor of Drupal Core allows attacker to inject XSS. Information Disclosure vulnerability in file module of Drupal Core allows an attacker to gain access to the file metadata of a permanent private file that they do not have access to by guessing the ID of the file. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74. This issue affects: Drupal Core 9.1.x versions prior to 9.1.7 9.0.x versions prior to 9.0.12 8.9.x versions prior to 8.9.14 7.x versions prior to 7.80.ĭrupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.Ĭross-site Scripting (XSS) vulnerability in Drupal core's sanitization API fails to properly filter cross-site scripting under certain circumstances. The modules do not correctly run all file validation, which causes an access bypass vulnerability. ![]() Sites that do not have the JSON:API module enabled are not affected.ĭrupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. Under some circumstances, the Drupal core JSON:API module does not properly restrict access to certain content, which may result in unintended access bypass. This issue affects: Drupal Core 8.8.X versions prior to 8.8.10 8.9.X versions prior to 8.9.6 9.0.X versions prior to 9.0.6. System using the drupal docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.Ĭross-site scripting vulnerability in l Drupal Core allows an attacker could leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. The official drupal docker images before 8.5.10-fpm-alpine (Alpine specific) contain a blank password for a root user. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. This could allow an attacker to inject disallowed values or overwrite data. This vulnerability is present in paid versions of the miniOrange Drupal SAML SP product affecting Drupal 7, 8, and 9.ĭrupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. Xecurify recommends updating miniOrange modules to their most recent versions. This vulnerability is not mitigated by configuring the module to enforce signatures or certificate checks. An attacker with access to a HTTP-request intercepting method is able to bypass authentication and authorization by removing the SAML Assertion Signature - impersonating existing users and existing roles, including administrative users/roles. Xecurify's miniOrange Premium, Standard, and Enterprise Drupal SAML SP modules possess an authentication and authorization bypass vulnerability. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |