SB2018101801 - Multiple vulnerabilities in Drupal
Published: October 18, 2018
Security Bulletin ID
SB2018101801
Severity
High
Patch available
YES
Number of vulnerabilities
5
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Security restrictions bypass (CVE-ID: N/A)
The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to incorrect permission handling. A remote authenticated attacker can bypass content moderation for certain transitions.
2) Open redirect (CVE-ID: N/A)
The vulnerability allows a remote authenticated attacker to perform open redirection attacks.
The vulnerability exists due to the attacker with "administer paths" permissions can use a particular path in the URL that leads to open redirect.
3) Open redirect (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform open redirection attacks.
The vulnerability exists due to insufficient filtration of user supplied data passed via the "destination" HTTP GET parameter. A remote attacker can trick the victim into following a specially crafted link that contains external website in the "destination" parameter and redirect users to a new destination after completing an action on the current page.
4) OS command injection (CVE-ID: N/A)
The vulnerability allows a remote authenticated attacker to compromise vulnerable system.
The vulnerability exists due to insufficient sanitization of the user-supplied input when sending email messages via DefaultMailSystem::mail() function. A remote attacker can inject and execute arbitrary OS commands on the vulnerable system with privileges of the web server.
5) Code injection (CVE-ID: N/A)
The vulnerability allows a remote attacker to compromise vulnerable application.
The vulnerability exists due to insufficient filtration of user supplied data within the contextual links functionality. A remote authenticated attacker with privileges to access contextual links can execute arbitrary PHP code on the target system.
Remediation
Install update from vendor's website.