Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Monster Menus - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-045

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Monster Menus - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-045


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Monster Menus - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-045
  • Date: Wed, 9 Oct 2024 16:48:26 +0000 (UTC)
  • Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=hRDVkFCe; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.136 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 2A6A160AAE
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 9B7AF60643
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-contrib-2024-045

Project: Monster Menus [1]
Date: 2024-October-09
Security risk: *Moderately critical* 13 ∕ 25
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Uncommon [2]
Vulnerability: Access bypass, Information Disclosure

Affected versions: <9.3.2
Description: 
This module enables you to group nodes within pages that have a
highly-granular, distributed permissions structure.

A function which can be used by third-party code does not return valid data
under certain rare circumstances. If the third-party code relies on this data
to decide whether to grant access to content, it may grant more access than
was intended.

This vulnerability is only present in sites that have custom code calling the
mm_content_get_uids_in_group() function with a single UID of zero (0) in the
second parameter.

Solution: 
Install the latest version:

* If you use the monster_menus module for Drupal 7.x, upgrade to
monster_menus 7.x-1.34 [3].
* If you use the monster_menus module version *9.3.x*, upgrade to
monster_menus 9.3.2 [4].
* If you use the monster_menus module version *9.4.0 or newer*, no change is
needed.

Reported By: 
* Dan Wilga [5]

Fixed By: 
* Dan Wilga [6]
* Ian McBride [7]

Coordinated By: 
* Greg Knaddison [8] of the Drupal Security Team
* Juraj Nemec [9] of the Drupal Security Team
* Damien McKenna [10] of the Drupal Security Team


[1] https://www.drupal.org/project/monster_menus
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/monster_menus/releases/7.x-1.34
[4] https://www.drupal.org/project/monster_menus/releases/9.3.2
[5] https://www.drupal.org/user/56892
[6] https://www.drupal.org/user/56892
[7] https://www.drupal.org/user/539500
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10
[10] https://www.drupal.org/u/damienmckenna

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] Monster Menus - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2024-045, security-news, 09.10.2024

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang