it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Matomo Analytics - Less critical - Cross Site Scripting - SA-CONTRIB-2023-033
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Matomo Analytics - Less critical - Cross Site Scripting - SA-CONTRIB-2023-033
- Date: Wed, 2 Aug 2023 19:26:19 +0000 (UTC)
- Authentication-results: mail.piratenpartei.de; dkim=none; spf=pass (mail.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 2605:bc80:3010::136 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org EA722612A6
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 4126061313
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org B642740569
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org EADDA4052E
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-contrib-2023-033
Project: Matomo Analytics [1]
Date: 2023-August-02
Security risk: *Less critical* 8∕25
AC:Complex/A:Admin/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Cross Site Scripting
Affected versions: <1.22.0
Description:
This module enables you to add the Matomo web statistics tracking system to
your website.
The module does not check the Matomo JS code loaded on the website. So a user
could configure the module to load JS from a malicious website.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer matomo" or "administer matomo tag manager"
(D8+ only) to access the settings forms where this can be configured.
Solution:
Install the latest version:
* If you use the Matomo Analytics module for Drupal 7, upgrade to Matomo
Analytics 7.x-2.15 [3]
* If you use the Matomo Analytics module for Drupal 8, upgrade to Matomo
Analytics 8.x-1.22 [4]
Sites are encouraged to review which roles have that permission and which
users have that role, to ensure that only trusted users have that permission.
Reported By:
* Pierre Rudloff [5]
Fixed By:
* Damien McKenna [6] of the Drupal Security Team
* Carsten Logemann [7]
* Florent Torregrosa [8]
* Pierre Rudloff [9]
Coordinated By:
* Neil Drumm [10] of the Drupal Security Team
[1] https://www.drupal.org/project/matomo
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/matomo/releases/7.x-2.15
[4] https://www.drupal.org/project/matomo/releases/8.x-1.22
[5] https://www.drupal.org/user/3611858
[6] https://www.drupal.org/user/108450
[7] https://www.drupal.org/user/218368
[8] https://www.drupal.org/user/2388214
[9] https://www.drupal.org/user/3611858
[10] https://www.drupal.org/user/3064
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Matomo Analytics - Less critical - Cross Site Scripting - SA-CONTRIB-2023-033, security-news, 02.08.2023
Archiv bereitgestellt durch MHonArc 2.6.24.