jQuery vulnerability with untrusted domains - Moderately Critical - Drupal 7 - CVE-2017-6929Ī jQuery cross site scripting vulnerability is present when making Ajax requests to untrusted domains (the CVE for this issue in jQuery is CVE-2015-9251). This vulnerability is mitigated by the fact that it only occurs for unusual site configurations. This check fails under certain conditions in which one module is trying to grant access to the file and another is trying to deny it, leading to an access bypass vulnerability. When using Drupal's private file system, Drupal will check to make sure a user has access to a file before allowing the user to view or download it. Private file access bypass - Moderately Critical - Drupal 7 - CVE-2017-6928 The PHP functions which Drupal provides for HTML escaping are not affected. This function does not correctly handle all methods of injecting malicious HTML, leading to a cross-site scripting vulnerability under certain circumstances. JavaScript cross-site scripting prevention is incomplete - Critical - Drupal 7 and Drupal 8 - CVE-2017-6927ĭrupal has a Drupal.checkPlain() JavaScript function which is used to escape potentially dangerous text before outputting it to HTML (as JavaScript output is not auto-escaped by either Drupal 7 or Drupal 8). This vulnerability is mitigated by the fact that the comment system must be enabled and the attacker must have permission to post comments. Users with permission to post comments are able to view content and comments they do not have access to, and are also able to add comments to this content. Comment reply form allows access to restricted content - Critical - Drupal 8 - CVE-2017-6926 This security advisory fixes multiple vulnerabilities in both Drupal 7 and Drupal 8.
0 Comments
Leave a Reply. |