it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Drupal core - Moderately critical - Access bypass - SA-CORE-2021-009
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Drupal core - Moderately critical - Access bypass - SA-CORE-2021-009
- Date: Wed, 15 Sep 2021 17:15:32 +0000 (UTC)
- Authentication-results: mail02.piratenpartei.de; dkim=none; spf=pass (mail02.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.136 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-core-2021-009
Project: Drupal core [1]
Date: 2021-September-15
Security risk: *Moderately critical* 10∕25
AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
CVE IDs: CVE-2020-13676
Description:
The QuickEdit module does not properly check access to fields in some
circumstances, which can lead to unintended disclosure of field data.
Sites are only affected if the QuickEdit module (which comes with the
Standard profile) is installed.
This advisory is not covered by Drupal Steward [3].
Solution:
Install the latest version:
* If you are using Drupal 9.2, update to Drupal 9.2.6 [4].
* If you are using Drupal 9.1, update to Drupal 9.1.13 [5].
* If you are using Drupal 8.9, update to Drupal 8.9.19 [6].
Versions of Drupal 8 prior to 8.9.x and versions of Drupal 9 prior to 9.1.x
are end-of-life and do not receive security coverage.
Drupal 7 core does not include the QuickEdit module and therefore is not
affected.
Uninstalling the QuickEdit module will also mitigate the vulnerability. Site
owners may wish to consider this option as the QuickEdit module will be
removed from core in Drupal 10 [7].
Reported By:
* Greg Watson [8]
Fixed By:
* Greg Watson [9]
* Wim Leers [10]
* Jess [11] of the Drupal Security Team
* Alex Bronstein [12] of the Drupal Security Team
* Lee Rowlands [13] of the Drupal Security Team
* Joseph Zhao [14]
* Vijay Mani [15]
* Adam G-H [16]
* Drew Webber [17] of the Drupal Security Team
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/steward
[4] https://www.drupal.org/project/drupal/releases/9.2.6
[5] https://www.drupal.org/project/drupal/releases/9.1.13
[6] https://www.drupal.org/project/drupal/releases/8.9.19
[7] https://www.drupal.org/node/3227039
[8] https://www.drupal.org/user/2212910
[9] https://www.drupal.org/user/2212910
[10] https://www.drupal.org/user/99777
[11] https://www.drupal.org/user/65776
[12] https://www.drupal.org/user/78040
[13] https://www.drupal.org/user/395439
[14] https://www.drupal.org/user/1987218
[15] https://www.drupal.org/user/93488
[16] https://www.drupal.org/user/205645
[17] https://www.drupal.org/user/255969
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Drupal core - Moderately critical - Access bypass - SA-CORE-2021-009, security-news, 15.09.2021
Archiv bereitgestellt durch MHonArc 2.6.24.