March 2017

Linkit - Moderately Critical - Access Bypass

* Advisory ID: DRUPAL-SA-CONTRIB-2014-0XX
* Project: Linkit- Enriched linking experience
* Version: 8.x
* Date: 2017-March-22
* Security risk: 10/25 ( Moderately Critical)
* Vulnerability: Access bypass

DESCRIPTION

Linkit provides an easy interface for internal and external linking with
WYSIWYG editors by using an autocomplete field.

When searching for entities, this module doesn't always enforce the access
restrictions and users may see information about entities they should not be
able to access.

Office Hours - Moderately Critical - Cross Site Scripting

* Advisory ID: DRUPAL-SA-CONTRIB-2017-032
* Project: Office Hours
* Version: 7.x
* Date: 2017-March-22
* Security risk: 10/25 ( Moderately Critical)
* Vulnerability: Cross Site Scripting

DESCRIPTION

This module enables you to show the office hours of a location to the public.
The module doesn't sufficiently filter user input for malicious Cross Site
Scripting (xss).

This vulnerability is mitigated by the fact that an attacker must have a role
with a permission to add fields to an entity.

Private - Critical - Access bypass

* Advisory ID: DRUPAL-SA-CONTRIB-2017-031
* Project: Private (third-party module)
* Version: 7.x
* Date: 2017-March-15
* Security risk: 15/25 ( Critical)
* Vulnerability: Access bypass

DESCRIPTION

This module enables you to mark nodes as private so that they are only
accessible to users that have been granted an extra permissions.

PRLP - Critical - Access Bypass and Privilege Escalation

* Advisory ID: DRUPAL-SA-CONTRIB-2017-030
* Project: Password Reset Landing Page (PRLP)
* Version: 8.x
* Date: 2017-March-08
* Security risk: 16/25 ( Critical)
* Vulnerability: Access bypass, Privilege escalation

DESCRIPTION

This module adds a form on the password-reset-landing page to allow changing
the password of the user during the log in process.

Services - Critical - Arbitrary Code Execution

* Advisory ID: DRUPAL-SA-CONTRIB-2016-029
* Project: Services
* Version: 7.x
* Date: 2017-March-08
* Security risk: 21/25 ( Highly Critical)
* Vulnerability: Arbitrary PHP code execution

DESCRIPTION

This module provides a standardized solution for building API's so that
external clients can communicate with Drupal.

The module accepts user submitted data in PHP's serialization format
("Content-Type: application/vnd.php.serialized") which can lead to arbitrary
remote code execution.

Breakpoint Panels - Critical - Unsupported

* Advisory ID: DRUPAL-SA-CONTRIB-2017-028
* Project: breakpoint panels (third-party module)
* Version: 7.x
* Date: 2017-March-01

DESCRIPTION

Breakpoint panels adds a button to the Panels In-Place Editor for each pane.
When selected, it will display checkboxes next to all of the breakpoints
specified in that modules UI. Unchecking any of these will 'hide' it from
that breakpoint.

Location Map - Moderately Critical - Multiple vulnerabilities

* Advisory ID: DRUPAL-SA-CONTRIB-2017-026
* Project: Location Map (third-party module)
* Version: 7.x
* Date: 2017-March-01
* Security risk: 10/25 ( Moderately Critical)
* Vulnerability: Cross Site Scripting, Access bypass

DESCRIPTION

This module enables you to display one simple location map via Google Maps.

The module doesn't sufficiently sanitize user input in the configuration text
fields of the module (allows any tags and does not respect text format
configuration).

Remember Me - Critical - Unsupported

* Advisory ID: DRUPAL-SA-CONTRIB-2017-025
* Project: Remember Me (third-party module)
* Version: 7.x
* Date: 2017-March-01

DESCRIPTION

Remember me is a module that allows users to check "Remember me" when
logging in.

The security team is marking this module unsupported. There is a known
security issue with the module that has not been fixed by the maintainer. If
you would like to maintain this module, please read:
https://www.drupal.org/node/251466

Pages