SB2018101801 - Multiple vulnerabilities in Drupal



SB2018101801 - Multiple vulnerabilities in Drupal

Published: October 18, 2018

Security Bulletin ID SB2018101801
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Medium 20% Low 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Security restrictions bypass (CVE-ID: N/A)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to incorrect permission handling. A remote authenticated attacker can bypass content moderation for certain transitions.

2) Open redirect (CVE-ID: N/A)

The vulnerability allows a remote authenticated attacker to perform open redirection attacks.

The vulnerability exists due to the attacker with "administer paths" permissions can use a particular path in the URL that leads to open redirect.

3) Open redirect (CVE-ID: N/A)

The vulnerability allows a remote attacker to perform open redirection attacks.

The vulnerability exists due to insufficient filtration of user supplied data passed via the "destination" HTTP GET parameter. A remote attacker can trick the victim into following a specially crafted link that contains external website in the "destination" parameter and redirect users to a new destination after completing an action on the current page.

4) OS command injection (CVE-ID: N/A)

The vulnerability allows a remote authenticated attacker to compromise vulnerable system.

The vulnerability exists due to insufficient sanitization of the user-supplied input when sending email messages via DefaultMailSystem::mail() function. A remote attacker can inject and execute arbitrary OS commands on the vulnerable system with privileges of the web server.

5) Code injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to compromise vulnerable application.

The vulnerability exists due to insufficient filtration of user supplied data within the contextual links functionality. A remote authenticated attacker with privileges to access contextual links can execute arbitrary PHP code on the target system.

Remediation

Install update from vendor's website.