===================================================================== CERT-Renater Note d'Information No. 2021/VULN084 _____________________________________________________________________ DATE : 17/02/2022 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Drupal core versions prior to 9.3.6, 9.2.13, 7.88. ===================================================================== https://www.drupal.org/sa-core-2022-003 https://www.drupal.org/sa-core-2022-004 _____________________________________________________________________ Drupal core - Moderately critical - Improper input validation - SA-CORE-2022-003 Project: Drupal core Date: 2022-February-16 Security risk: Moderately critical 14/25 AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/ TD:Uncommon Vulnerability: Improper input validation CVE IDs: CVE-2022-25271 Description: Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. This advisory is not covered by Drupal Steward. Solution: Install the latest version: o If you are using Drupal 9.3, update to Drupal 9.3.6. o If you are using Drupal 9.2, update to Drupal 9.2.13. o If you are using Drupal 7, update to Drupal 7.88. All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life. Reported By: o Fabian Iwand Fixed By: o xjm of the Drupal Security Team o Lee Rowlands of the Drupal Security Team o Ben Dougherty of the Drupal Security Team o Drew Webber of the Drupal Security Team o Jen Lampton o Nate Lampton o Fabian Franz o Alex Bronstein of the Drupal Security Team _____________________________________________________________________ Drupal core - Moderately critical - Information disclosure - SA-CORE-2022-004 Project: Drupal core Date: 2022-February-16 Security risk: Moderately critical 12/25 AC:None/A:User/CI:Some/II:None/E:Theoretical/ TD:Default Vulnerability: Information disclosure CVE IDs: CVE-2022-25270 Description: The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Also see Quick Edit - Moderately critical - Access bypass - SA-CONTRIB-2022-025 which addresses the same vulnerability for the contributed module. This advisory is not covered by Drupal Steward. Solution: Install the latest version: o If you are using Drupal 9.3, update to Drupal 9.3.6. o If you are using Drupal 9.2, update to Drupal 9.2.13. All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life. Drupal 7 core does not include the QuickEdit module and therefore is not affected. Uninstalling the QuickEdit module will also mitigate the vulnerability. Site owners may wish to consider this option as the QuickEdit module will be removed from core in Drupal 10. Reported By: o Samuel Mortenson Fixed By: o Theodore Biadala o xjm of the Drupal Security Team o Alex Bronstein of the Drupal Security Team o Adam G-H o Drew Webber of the Drupal Security Team o Wim Leers o Ted Bowman o Dave Long o Derek Wright o Lee Rowlands of the Drupal Security Team o Samuel Mortenson o Joseph Zhao ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================