Password Reset Landing Page (PRLP) - Highly critical - Access bypass - SA-CONTRIB-2020-021
Project: Password Reset Landing Page (PRLP)
Date: 2020-May-27
Security risk: Highly critical 20∕25
Vulnerability: Access bypass
Project: Password Reset Landing Page (PRLP)
Date: 2020-May-27
Security risk: Highly critical 20∕25
Vulnerability: Access bypass
Project: Drupal Commerce
Date: 2020-May-27
Security risk: Moderately critical 12∕25
Vulnerability: Access bypass
Drupal Commerce is used to build eCommerce websites and applications. It's possible to configure commerce to permit orders by anonymous users. In this configuration, customers who do not choose to create an account upon checkout completion remain anonymous, and the resulting orders are never assigned an owner.
Project: Drupal core
Date: 2020-May-20
Security risk: Moderately critical 10∕25
Vulnerability: Open Redirect
Drupal 7 has an Open Redirect vulnerability. For example, a user could be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL.
The vulnerability is caused by insufficient validation of the destination query parameter in the drupal_goto()
function.
Project: reCAPTCHA v3
Date: 2020-May-13
Security risk: Critical 18∕25
Vulnerability: Access bypass
The reCaptcha v3 module enables you to protect your forms using the Google reCaptcha V3.
If the reCaptcha v3 challenge succeeds, all the other form validations are bypassed. This makes it possible for attackers to submit invalid or incomplete forms.
Project: Webform
Date: 2020-May-13
Security risk: Critical 15∕25
Vulnerability: Access bypass
This webform module enables you to build a 'Term checkboxes' element.
The module doesn't sufficiently check term 'view' access when rendering 'Term checkboxes' elements. Unpublished terms will always appear in the 'Term checkboxes' element.
Drupal Security team has released multiple critical and moderately critical security advisories for Webform module today. This module enables you to build forms and surveys in Drupal.
Project: Webform
Date: 2020-May-06
Security risk: Critical 17∕25
Vulnerability: Remote Code Execution
Project: JSON:API
Version: 8.x-1.26
Date: 2020-April-15
Security risk: Critical 15∕25
Vulnerability: Unsupported
This module provides a JSON API standards-compliant API for accessing and manipulating Drupal content and configuration entities.
Project: Spamicide
Date: 2020-April-08
Security risk: Critical 18∕25
Vulnerability: Access bypass
The Spamicide module protects Drupal forms with a form field that is hidden from normal users, but visible to spam bots.
The module doesn't require appropriate permissions for administrative pages leading to an Access Bypass.
Install the latest version:
Project: Svg Image
Date: 2020-March-25
Security risk: Critical 15∕25
Vulnerability: Cross site scripting
SVG Image module allows to upload SVG files.
The module did not sufficiently protect against malicious code inside SVG files leading to a Cross Site Scripting vulnerability.
This vulnerability is mitigated by the fact that an attacker must have permission to upload an SVG file.
Install the latest version: