Vulnerabilities

Restriction Bypass, XSS Flaws Patched in Drupal 8

The developers of the Drupal content management system (CMS) announced on Wednesday the availability of versions 8.1.10 and 8.2.0-rc2, which address three potentially serious vulnerabilities.

<p><strong><span><span>The developers of the Drupal content management system (CMS) announced on Wednesday the availability of versions 8.1.10 and 8.2.0-rc2, which address three potentially serious vulnerabilities.</span></span></strong></p>

The developers of the Drupal content management system (CMS) announced on Wednesday the availability of versions 8.1.10 and 8.2.0-rc2, which address three potentially serious vulnerabilities.

Drupal versions 8.x are affected by two restriction bypass issues and one cross-site scripting (XSS) vulnerability. The XSS flaw, rated “critical,” allows an attacker to execute arbitrary code in the victim’s browser if they can get the targeted user to access a specially crafted URL. The problem is caused by lack of proper sanitization in HTTP exceptions.

Another vulnerability, also rated “critical,” is related to the feature that allows Drupal users to export their site’s configuration to a file. The feature should normally be limited to users who have the right permissions, but a flaw makes it possible to download full configuration exports even without administrative privileges.

A less critical restriction bypass issue is related to the visibility of comments. Experts discovered that a user who has rights to edit a node can set the visibility on comments for that node, despite the fact that this operation should be restricted to users who have “administer comments” permissions.

Quintus Maximus, Kier Heyl, Anton Shubkin and Ivan have been credited for reporting these issues to Drupal developers. CVE identifiers have yet to be assigned to the vulnerabilities.

It’s important for website administrators to quickly apply Drupal security updates as many of the vulnerabilities affecting the CMS are being exploited in the wild in an effort to hack websites.

Sucuri reported this summer that a flaw patched nearly two years ago, dubbed “Drupalgeddon,” had still been successfully exploited to compromise websites.

Earlier this month, the SANS Institute’s Internet Storm Center warned that a Drupal module bug addressed two months ago had been exploited in the wild. The organization’s honeypots detected 44 exploitation attempts coming from 16 unique IP addresses in a single day.

Advertisement. Scroll to continue reading.

Related Reading: Drupal Patches Critical Vulnerabilities in Three Modules

Related Reading: Drupal Security Updates Patch Two Vulnerabilities

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version