it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget Chain - SA-CORE-2025-003
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget Chain - SA-CORE-2025-003
- Date: Wed, 19 Feb 2025 18:13:43 +0000 (UTC)
- Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=N3hABe+N; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.133 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org A800041426
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 0137641342
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-core-2025-003
Project: Drupal core [1]
Date: 2025-February-19
Security risk: *Moderately critical* 14 ∕ 25
AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:Uncommon [2]
Vulnerability: Gadget Chain
Affected versions: >= 8.0.0 < 10.3.13 || >= 10.4.0 < 10.4.3 || >= 11.0.0 <
11.0.12 || >= 11.1.0 < 11.1.3
Description:
Drupal core contains a potential PHP Object Injection vulnerability that (if
combined with another exploit) could lead to Arbitrary File Inclusion.
Techniques exist to escalate this attack to Remote Code Execution. It is not
directly exploitable.
This issue is mitigated by the fact that in order for it to be exploitable, a
separate vulnerability must be present to allow an attacker to pass unsafe
input to unserialize(). There are no such known exploits in Drupal core.
Solution:
Install the latest version:
* If you use Drupal 10.3.x, update to Drupal 10.3.13 [3]
* If you use Drupal 10.4.x, update to Drupal 10.4.3 [4]
* If you use Drupal 11.0.x, update to Drupal 11.0.12 [5]
* If you use Drupal 11.1.x, update to Drupal 11.1.3 [6]
All versions of Drupal 10 prior to 10.3 are end-of-life and do not receive
security coverage. (Drupal 8 [7] and Drupal 9 [8] have both reached
end-of-life.)
Reported By:
* anzuukino [9]
* shin24 [10]
Fixed By:
* ghost of drupal past [11]
* Dave Long (longwave) [12] of the Drupal Security Team
* Drew Webber (mcdruid) [13] of the Drupal Security Team
* nicxvan [14]
* shin24 [15]
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/drupal/releases/10.3.13
[4] https://www.drupal.org/project/drupal/releases/10.4.3
[5] https://www.drupal.org/project/drupal/releases/11.0.12
[6] https://www.drupal.org/project/drupal/releases/11.1.3
[7] https://www.drupal.org/psa-2021-06-29
[8] https://www.drupal.org/psa-2023-11-01
[9] https://www.drupal.org/u/anzuukino
[10] https://www.drupal.org/u/shin24
[11] https://www.drupal.org/u/ghost-of-drupal-past
[12] https://www.drupal.org/u/longwave
[13] https://www.drupal.org/u/mcdruid
[14] https://www.drupal.org/u/nicxvan
[15] https://www.drupal.org/u/shin24
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Drupal core - Moderately critical - Gadget Chain - SA-CORE-2025-003, security-news, 19.02.2025
Archiv bereitgestellt durch MHonArc 2.6.19+.