You are here
Home > Preporuke > Nadogradnja za kritičnu ranjivost u CMS-u Drupal

Nadogradnja za kritičnu ranjivost u CMS-u Drupal

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L, U, M, W
  • Kategorije: LSU, FBS, APL, LRH, W08, LDE, LFE, W12, LGE, LUB, W16, W19

View online: https://www.drupal.org/sa-core-2019-008

Project: Drupal core [1]
Date: 2019-July-17
Security risk: *Critical* 17∕25
AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass

CVE IDs: CVE-2019-6342
Description: 
In Drupal 8.7.4, when the experimental [3] Workspaces module is enabled, an
access bypass condition is created.

This can be mitigated by disabling the Workspaces module. It does not affect
any release other than Drupal 8.7.4.

Drupal 8.7.3 and earlier, Drupal 8.6.x and earlier, and Drupal 7.x are *not*
affected.

Solution: 
If the site is running Drupal 8.7.4, upgrade to Drupal 8.7.5.

*Note, manual step needed.* For sites with the Workspaces module enabled,
update.php needs to run to ensure a required cache clear. If there is a
reverse proxy cache or content delivery network (e.g. Varnish, CloudFlare) it
is also advisable to clear these as well.

Reported By: 
* Dave Botsch [4]

Fixed By: 
* Michael Hess [5] of the Drupal Security Team
* Jess [6] of the Drupal Security Team
* Greg Knaddison [7] of the Drupal Security Team
* Chris McCafferty [8] of the Drupal Security Team
* Neil Drumm [9] of the Drupal Security Team
* Alex Pott [10] of the Drupal Security Team
* Andrei Mateescu [11]

[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/core/experimental#beta
[4] https://www.drupal.org/user/3534164
[5] https://www.drupal.org/user/102818
[6] https://www.drupal.org/user/65776
[7] https://www.drupal.org/user/36762
[8] https://www.drupal.org/user/1850070
[9] https://www.drupal.org/user/3064
[10] https://www.drupal.org/user/157725
[11] https://www.drupal.org/user/729614

_______________________________________________
Security-news mailing list
Security-news@drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news

AutorJosip Papratovic
Cert idNCERT-REF-2019-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa squid3

Otkriveni su sigurnosni nedostaci u programskom paketu squid3 za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja...

Close