Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Drupal core - Moderately critical - Access bypass - SA-CORE-2021-008

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Drupal core - Moderately critical - Access bypass - SA-CORE-2021-008


Chronologisch Thread 
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Drupal core - Moderately critical - Access bypass - SA-CORE-2021-008
  • Date: Wed, 15 Sep 2021 17:15:03 +0000 (UTC)
  • Authentication-results: mail02.piratenpartei.de; dkim=none; spf=pass (mail02.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.138 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-core-2021-008

Project: Drupal core [1]
Date: 2021-September-15
Security risk: *Moderately critical* 11∕25
AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Access bypass

CVE IDs: CVE-2020-13675
Description: 
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP
APIs. The modules do not correctly run all file validation, which causes an
access bypass vulnerability. An attacker might be able to upload files that
bypass the file validation process implemented by modules on the site.

This vulnerability is mitigated by three factors:

1) The JSON:API or REST File upload modules must be enabled on the site.
2) An attacker must have access to a file upload via JSON:API or REST.
3) The site must employ a file validation module.

This advisory is not covered by Drupal Steward [3].

Also see GraphQL - Moderately critical - Access bypass - SA-CONTRIB-2021-029
[4] which addresses a similar vulnerability for that module.

Solution: 
Install the latest version:

* If you are using Drupal 9.2, update to Drupal 9.2.6 [5].
* If you are using Drupal 9.1, update to Drupal 9.1.13 [6].
* If you are using Drupal 8.9, update to Drupal 8.9.19 [7].

Versions of Drupal 8 prior to 8.9.x and versions of Drupal 9 prior to 9.1.x
are end-of-life and do not receive security coverage.

Drupal 7 core is not affected.

Reported By: 
* Klaus Purer [8]

Fixed By: 
* Klaus Purer [9]
* Lee Rowlands [10] of the Drupal Security Team
* Alex Pott [11] of the Drupal Security Team
* Jess [12] of the Drupal Security Team
* Samuel Mortenson [13]
* Drew Webber [14] of the Drupal Security Team
* Kim Pepper [15]


[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/steward
[4] https://www.drupal.org/sa-contrib-2021-029
[5] https://www.drupal.org/project/drupal/releases/9.2.6
[6] https://www.drupal.org/project/drupal/releases/9.1.13
[7] https://www.drupal.org/project/drupal/releases/8.9.19
[8] https://www.drupal.org/user/262198
[9] https://www.drupal.org/user/262198
[10] https://www.drupal.org/user/395439
[11] https://www.drupal.org/user/157725
[12] https://www.drupal.org/user/65776
[13] https://www.drupal.org/user/2582268
[14] https://www.drupal.org/user/255969
[15] https://www.drupal.org/user/370574

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] Drupal core - Moderately critical - Access bypass - SA-CORE-2021-008, security-news, 15.09.2021

Archiv bereitgestellt durch MHonArc 2.6.24.

Seitenanfang