it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Drupal core - Moderately critical - Cross Site Request Forgery - SA-CORE-2021-007
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Drupal core - Moderately critical - Cross Site Request Forgery - SA-CORE-2021-007
- Date: Wed, 15 Sep 2021 17:14:49 +0000 (UTC)
- Authentication-results: mail02.piratenpartei.de; dkim=none; spf=pass (mail02.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.138 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-core-2021-007
Project: Drupal core [1]
Date: 2021-September-15
Security risk: *Moderately critical* 14∕25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross Site Request Forgery
CVE IDs: CVE-2020-13674
Description:
The QuickEdit module does not properly validate access to routes, which could
allow cross-site request forgery under some circumstances and lead to
possible data integrity issues.
Sites are only affected if the QuickEdit module (which comes with the
Standard profile) is installed. Removing the "access in-place editing"
permission from untrusted users *will not* fully mitigate the vulnerability.
This advisory is not covered by Drupal Steward [3].
Solution:
Install the latest version:
* If you are using Drupal 9.2, update to Drupal 9.2.6 [4].
* If you are using Drupal 9.1, update to Drupal 9.1.13 [5].
* If you are using Drupal 8.9, update to Drupal 8.9.19 [6].
Versions of Drupal 8 prior to 8.9.x and versions of Drupal 9 prior to 9.1.x
are end-of-life and do not receive security coverage.
Drupal 7 core does not include the QuickEdit module and therefore is not
affected.
Uninstalling the QuickEdit module will also mitigate the vulnerability. Site
owners may wish to consider this option as the QuickEdit module will be
removed from core in Drupal 10 [7].
Reported By:
* Samuel Mortenson [8]
Fixed By:
* Wim Leers [9]
* Greg Knaddison [10] of the Drupal Security Team
* Jess [11] of the Drupal Security Team
* Lee Rowlands [12] of the Drupal Security Team
* Vijay Mani [13]
* Heine [14] of the Drupal Security Team
* Alex Bronstein [15] of the Drupal Security Team
* Adam G-H [16]
* Drew Webber [17] of the Drupal Security Team
* Théodore Biadala [18]
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/steward
[4] https://www.drupal.org/project/drupal/releases/9.2.6
[5] https://www.drupal.org/project/drupal/releases/9.1.13
[6] https://www.drupal.org/project/drupal/releases/8.9.19
[7] https://www.drupal.org/node/3227039
[8] https://www.drupal.org/user/2582268
[9] https://www.drupal.org/user/99777
[10] https://www.drupal.org/user/36762
[11] https://www.drupal.org/user/65776
[12] https://www.drupal.org/user/395439
[13] https://www.drupal.org/user/93488
[14] https://www.drupal.org/user/17943
[15] https://www.drupal.org/user/78040
[16] https://www.drupal.org/user/205645
[17] https://www.drupal.org/user/255969
[18] https://www.drupal.org/user/598310
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Drupal core - Moderately critical - Cross Site Request Forgery - SA-CORE-2021-007, security-news, 15.09.2021
Archiv bereitgestellt durch MHonArc 2.6.24.