
====================================================================

                                 CERT-Renater

                      Note d'Information No. 2016/VULN294
_____________________________________________________________________

DATE                : 12/08/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Google Analytics for Drupal,
                       Piwik for Drupal, OAuth2 Client for Drupal,
                       Require Login for Drupal.

=====================================================================
https://www.drupal.org/node/2782023
https://www.drupal.org/node/2782027
https://www.drupal.org/node/2782035
https://www.drupal.org/node/2782109
____________________________________________________________________

Google Analytics - Moderately Critical - Cross Site Scripting -
SA-CONTRIB-2016-042

Posted by Drupal Security Team on August 10, 2016 at 1:20pm

     Advisory ID: DRUPAL-SA-CONTRIB-2016-042
     Project: Google Analytics (third-party module)
     Version: 7.x, 8.x
     Date: 2016-August-10
     Security risk: 13/25 ( Moderately Critical) 
AC:None/A:Admin/CI:Some/II:Some/E:Theoretical/TD:Uncommon
     Vulnerability: Cross Site Scripting


Description

This module enables you to add integration with Google Analytics
statistics service.
The module allows admin users to enter custom JavaScript snippets to
add advanced tracking functionality. The permission required to enter
this JavaScript was not marked as restricted.

This vulnerability is mitigated by the fact that an attacker must have
a role with the permission "Administer Google Analytics".

For greater flexibility a new feature has been added to the module to
implement the new permission "Add JavaScript snippets" that can be
assigned to users who are allowed to add JS code snippets into your web
site.

If you have granted the Administer Google Analytics permission to non
trusted users, please check your settings to make sure all javascript
entered is valid.

CVE identifier(s) issued

     A CVE identifier will be requested, and added upon issuance, in
accordance with Drupal Security Team processes.


Versions affected
Google Analytics 7.x-2.x versions prior to 7.x-2.3.
Google Analytics 8.x-2.x versions prior to 8.x-2.1.

Drupal core is not affected. If you do not use the contributed Google
Analytics module, there is nothing you need to do.


Solution

Install the latest version:
If you use the Google Analytics module for Drupal 7.x, upgrade to Google 
Analytics 7.x-2.3
If you use the Google Analytics module for Drupal 8.x, upgrade to Google 
Analytics 8.x-2.1

Also see the Google Analytics project page.


Reported by

     Michael Hess of the Drupal Security Team

Fixed by

     Lee Rowlands of the Drupal Security Team
     Alexander Hass the module maintainer

Coordinated by

     Michael Hess of the Drupal Security Team

Contact and More Information

The Drupal security team can be reached at security at drupal.org or
via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing
secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity

⋅ Categories: Drupal 7.x, Drupal 8.x

____________________________________________________________________

Piwik - Moderately Critical - Cross Site Scripting - SA-CONTRIB-2016-043

Posted by Drupal Security Team on August 10, 2016 at 1:26pm

     Advisory ID: DRUPAL-SA-CONTRIB-2016-043
     Project: Piwik Web Analytics (third-party module)
     Version: 7.x, 8.x
     Date: 2016-August-10
     Security risk: 13/25 ( Moderately Critical) 
AC:None/A:Admin/CI:Some/II:Some/E:Theoretical/TD:Uncommon
     Vulnerability: Cross Site Scripting


Description

This module enables you to add integration with Piwik statistics
service.
The module allows admin users to enter custom JavaScript snippets to
add advanced tracking functionality. The permission required to enter
this JavaScript was not marked as restricted.

This vulnerability is mitigated by the fact that an attacker must have
a role with the permission "Administer Piwik".

For greater flexibility a new feature has been added to the module to
implement the new permission "Add JavaScript snippets" that can be
assigned to users who are allowed to add JS code snippets into your web
site.

If you have granted the Administer Piwik permission to non trusted
users, please check your settings to make sure all javascript entered
is valid.

CVE identifier(s) issued

     A CVE identifier will be requested, and added upon issuance, in
accordance with Drupal Security Team processes.


Versions affected

     Piwik 7.x-2.x versions prior to 7.x-2.9.
     Piwik 8.x-2.x versions prior to 8.x-1.1.

Drupal core is not affected. If you do not use the contributed Piwik
Web Analytics module, there is nothing you need to do.


Solution

Install the latest version:
If you use the Piwik module for Drupal 7.x, upgrade to Piwik 7.x-2.9
If you use the Piwik module for Drupal 8.x, upgrade to Piwik 8.x-1.1

Also see the Piwik Web Analytics project page.


Reported by

     Alexander Hass the module maintainer


Fixed by

     Alexander Hass the module maintainer


Coordinated by

     Michael Hess of the Drupal Security Team


Contact and More Information

The Drupal security team can be reached at security at drupal.org or
via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing
secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity

⋅ Categories: Drupal 7.x, Drupal 8.x


____________________________________________________________________

OAuth2 Client- Moderately Critical - Cross Site Request Forgery -
SA-CONTRIB-2016-044

Posted by Drupal Security Team on August 10, 2016 at 1:30pm

     Advisory ID: DRUPAL-SA-CONTRIB-2016-044
     Project: OAuth2 Client (third-party module)
     Version: 7.x
     Date: 2016-August-10
     Security risk: 10/25 ( Moderately Critical) 
AC:Complex/A:None/CI:None/II:None/E:Proof/TD:All
     Vulnerability: Cross Site Request Forgery


Description

This module provides an OAuth2 client.

The module does not check the validity of the state parameter, during
server-side flow, before getting a token. This may allow a malicious
user to feed a fake access_token to another user, and subsequently
provide him fake data from the server. This page explains it in more
details: 
http://www.twobotechnologies.com/blog/2014/02/importance-of-state-in-oau...

CVE identifier(s) issued

     A CVE identifier will be requested, and added upon issuance, in
accordance with Drupal Security Team processes.

Versions affected

     OAuth2 Client 7.x-1.x versions prior to 7.x-1.5.

Drupal core is not affected. If you do not use the contributed OAuth2
Client module, there is nothing you need to do.


Solution

Install the latest version:

     If you use the OAuth2 Client module for Drupal 7.x, upgrade to
OAuth2 Client 7.x-1.5

Also see the OAuth2 Client project page.


Reported by

     Jason Woods


Fixed by

     Dashamir Hoxha the module maintainer


Coordinated by

     Michael Hess of the Drupal Security Team


Contact and More Information

The Drupal security team can be reached at security at drupal.org or
via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing
secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity


____________________________________________________________________

Require Login - Moderately Critical - Multiple vulnerabilities -
SA-CONTRIB-2016-045

Posted by Drupal Security Team on August 10, 2016 at 3:08pm

     Advisory ID: SA-CONTRIB-2016-045
     Project: Require Login (third-party module)
     Version: 7.x, 8.x
     Date: 2016-August-10
     Security risk: 13/25 ( Moderately Critical) 
AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:All
     Vulnerability: Cross Site Scripting, Access bypass


Description

This module enables you to restrict site access without using user
roles or permissions.

The module does not sufficiently escape some of its settings, and, in
some cases, allows malicious users to bypass the protection offered by
Require Login.

CVE identifier(s) issued

     A CVE identifier will be requested, and added upon issuance, in
  accordance with Drupal Security Team processes.


Versions affected

     Require Login 7.x-2.x versions prior to 7.x-2.4
     Require Login 8.x-1.x versions prior to 8.x-1.8

Drupal core is not affected. If you do not use the contributed Require
Login module, there is nothing you need to do.


Solution

Install the latest version:

     If you use the Require Login module for Drupal 7.x, upgrade to
Require Login 7.x-2.4
     If you use the Require Login module for Drupal 8.x, upgrade to
Require Login 8.x-1.8

Also see the Require Login project page.


Reported by

     Ivo Van Geertruyen of the Drupal Security Team


Fixed by

     Robert Phillips the module maintainer
     Ivo Van Geertruyen of the Drupal Security Team


Coordinated by

     Ivo Van Geertruyen of the Drupal Security Team


Contact and More Information

The Drupal security team can be reached at security at drupal.org or
via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing
secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity


==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================






