
===================================================================                                   CERT-Renater

                        Note d'Information No. 2022/VULN201

_____________________________________________________________________

DATE                : 13/06/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Drupal core versions prior
                               to 9.4.0-rc2, 9.3.16, 9.2.21.

====================================================================https://www.drupal.org/sa-core-2022-011
_____________________________________________________________________


Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011

Project:         Drupal core
Date:            2022-June-10
Security risk: Moderately critical 13∕25 
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon
Vulnerability:   Third-party libraries
CVE IDs:         CVE-2022-31042
                  CVE-2022-31043


Description:
Updated 22:00 UTC 2022-06-10: Added steps to update without 
drupal/core-recommended.

Drupal uses the third-party Guzzle library for handling HTTP requests 
and responses to external services. Guzzle has released two security 
advisories:

     Failure to strip the Cookie header on change in host or HTTP downgrade
     Fix failure to strip Authorization header on HTTP downgrade

These do not affect Drupal core, but may affect some contributed 
projects or custom code on Drupal sites.


We are issuing this security advisory outside our regular Drupal 
security release window schedule since Guzzle has already published 
information about the vulnerabilities, and vulnerabilities might exist 
in contributed modules or custom modules that use Guzzle for outgoing 
requests. Guzzle has rated these vulnerabilities as high-risk.

This advisory is not covered by Drupal Steward.


Solution:
Install the latest version:

     If you are using Drupal 9.4, update to Drupal 9.4.0-rc2.
     If you are using Drupal 9.3, update to Drupal 9.3.16.
     If you are using Drupal 9.2, update to Drupal 9.2.21.

All versions of Drupal 9 prior to 9.2.x are end-of-life and do not 
receive security coverage. Note that Drupal 8 has reached its end of life.

Drupal 7 is not affected.

Advanced users may also work around this issue by temporarily using 
drupal/core instead of drupal/core-recommended and then updating Guzzle 
to the desired version. More information on managing Guzzle with Drupal 9.4.


Reported By:
     GHaddon
     Jeroen Tubex
     Yasen Ivanov


Fixed By:
     Heine of the Drupal Security Team
     Dave Long, provisional member of the Drupal Security Team
     Damien McKenna of the Drupal Security Team
     Michael Hess of the Drupal Security Team
     cilefen of the Drupal Security Team
     xjm of the Drupal Security Team
     Benji Fisher, provisional member of the Drupal Security Team


========================================================+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=======================================================
