Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Opigno TinCan Question Type - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-031

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Opigno TinCan Question Type - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-031


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Opigno TinCan Question Type - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-031
  • Date: Wed, 21 Aug 2024 17:08:41 +0000 (UTC)
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 6913C8116D
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 2C16B80886
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-contrib-2024-031

Project: Opigno TinCan Question Type [1]
Date: 2024-August-21
Security risk: *Critical* 16∕25
AC:Complex/A:User/CI:All/II:All/E:Theoretical/TD:Default [2]
Vulnerability: Arbitrary PHP code execution

Description: 
The Opigno TinCan Question Type module is related to Opigno LMS distribution.
The module adds a new question type for the Quiz module. With this new
question type, you will be able to import TinCan Packages to your Drupal
instance and to use it as a question.

Uploaded files were not sufficiently validated to prevent arbitrary file
uploads, which could lead to Remote Code Execution (RCE) and/or Cross Site
Scripting (XSS).

This vulnerability is mitigated by the fact that it requires the attacker
have a role with the permission to create or edit "TinCan Package" content
type.

Solution: 
Install the latest version:

* If you use the /opigno_tincan_question_type/ module, upgrade to
opigno_tincan_question_type 7.x-1.3 [3]

Reported By: 
* Juraj Nemec [4] of the Drupal Security Team
* Marcin Grabias [5]
* catch [6] of the Drupal Security Team

Fixed By: 
* Juraj Nemec [7] of the Drupal Security Team
* Axel Minck [8]
* Yurii Boichenko [9]

Coordinated By: 
* Greg Knaddison [10] of the Drupal Security Team
* Juraj Nemec [11] of the Drupal Security Team


[1] https://www.drupal.org/project/opigno_tincan_question_type
[2] https://www.drupal.org/security-team/risk-levels
[3]
https://www.drupal.org/project/opigno_tincan_question_type/releases/7.x-1.3
[4] https://www.drupal.org/user/272316
[5] https://www.drupal.org/user/1599440
[6] https://www.drupal.org/user/35733
[7] https://www.drupal.org/user/272316
[8] https://www.drupal.org/user/1065700
[9] https://www.drupal.org/user/624860
[10] https://www.drupal.org/user/36762
[11] https://www.drupal.org/u/poker10

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] Opigno TinCan Question Type - Critical - Arbitrary PHP code execution - SA-CONTRIB-2024-031, security-news, 21.08.2024

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang