Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011
  • Date: Fri, 10 Jun 2022 19:50:19 +0000 (UTC)
  • Authentication-results: mail.piratenpartei.de; dkim=none; spf=pass (mail.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.133 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-core-2022-011

Project: Drupal core [1]
Date: 2022-June-10
Security risk: *Moderately critical* 13∕25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Third-party libraries

CVE IDs: CVE-2022-31042CVE-2022-31043
Description: 
Drupal uses the third-party Guzzle library for handling HTTP requests and
responses to external services. Guzzle has released two security advisories:

* Failure to strip the Cookie header on change in host or HTTP downgrade [3]
* Fix failure to strip Authorization header on HTTP downgrade [4]

These do not affect Drupal core, but may affect some contributed projects or
custom code on Drupal sites.

We are issuing this security advisory outside our regular Drupal security
release window schedule [5] since Guzzle has already published information
about the vulnerabilities, and vulnerabilities might exist in contributed
modules or custom modules that use Guzzle for outgoing requests. Guzzle has
rated these vulnerabilities as high-risk.

This advisory is not covered by Drupal Steward.

Solution: 
Install the latest version:

* If you are using Drupal 9.4, update to Drupal 9.4.0-rc2 [6].
* If you are using Drupal 9.3, update to Drupal 9.3.16 [7].
* If you are using Drupal 9.2, update to Drupal 9.2.21 [8].

All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive
security coverage. Note that Drupal 8 has reached its end of life [9].

Drupal 7 is not affected.

Reported By: 
* GHaddon [10]
* Jeroen Tubex [11]
* Yasen Ivanov [12]

Fixed By: 
* Heine [13] of the Drupal Security Team
* Dave Long [14]
* Damien McKenna [15] of the Drupal Security Team
* Michael Hess [16] of the Drupal Security Team
* cilefen [17] of the Drupal Security Team
* xjm [18] of the Drupal Security Team
* Benji Fisher [19]


[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9
[4] https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
[5] https://www.drupal.org/node/1173280
[6] https://www.drupal.org/project/drupal/releases/9.4.0-rc2
[7] https://www.drupal.org/project/drupal/releases/9.3.16
[8] https://www.drupal.org/project/drupal/releases/9.2.21
[9] https://www.drupal.org/psa-2021-06-29
[10] https://www.drupal.org/user/1507580
[11] https://www.drupal.org/user/2228934
[12] https://www.drupal.org/user/3513564
[13] https://www.drupal.org/user/17943
[14] https://www.drupal.org/user/246492
[15] https://www.drupal.org/user/108450
[16] https://www.drupal.org/user/102818
[17] https://www.drupal.org/user/1850070
[18] https://www.drupal.org/user/65776
[19] https://www.drupal.org/user/683300

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011, security-news, 10.06.2022

Archiv bereitgestellt durch MHonArc 2.6.24.

Seitenanfang