You are here
Home > Preporuke > Nadogradnja za Drupal

Nadogradnja za Drupal

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: O
  • Kategorije: ALL, W08, W12, W16, HPQ, LRH, LDE, LSU, FBS, LFE, LGE, LUB, APL

View online: https://www.drupal.org/SA-2017-001

Drupal 8.2.7, a maintenance release which contains fixes for security
vulnerabilities, is now available for download.

Download Drupal 8.2.7 [1]

*Upgrading [2] your existing Drupal 8 sites is strongly recommended.* There
are no new features nor non-security-related bug fixes in this release. See
the 8.2.7 release notes [3] for details on important changes and known issues
affecting this release. Read on for details of the security vulnerabilities
that were fixed in this release.
* Advisory ID: DRUPAL-SA-CORE-2017-001
* Project: Drupal core [4]
* Version: 7.x, 8.x
* Date: 2017-March-15

——– DESCRIPTION
———————————————————

.. Editor module incorrectly checks access to inline private files – Drupal 8
– Access Bypass – Critical – CVE-2017-6377

When adding a private file via a configured text editor (like CKEditor), the
editor will not correctly check access for the file being attached, resulting
in an access bypass.

.. Some admin paths were not protected with a CSRF token – Drupal 8 – Cross
Site Request Forgery – Moderately Critical – CVE-2017-6379

Some administrative paths did not include protection for CSRF. This would
allow an attacker to disable some blocks on a site. This issue is mitigated
by the fact that users would have to know the block ID.

.. Remote code execution – Drupal 8 – Remote code execution – Moderately
Critical – CVE-2017-6381

A 3rd party development library including with Drupal 8 development
dependencies is vulnerable to remote code execution.

This is mitigated by the default .htaccess protection against PHP execution,
and the fact that Composer development dependencies aren’t normal installed.

You might be vulnerable to this if you are running a version of Drupal before
8.2.2. To be sure you aren’t vulnerable, you can remove the
/vendor/phpunit directory from the site root of your production deployments.

——– SOLUTION
————————————————————

Upgrade to Drupal 8.2.7
——– REPORTED BY
———————————————————

.. Editor module incorrectly checks access to inline private files – Drupal 8
– Access Bypass – Critical – CVE-2017-6377

* Casey [5]

.. Some admin paths were not protected with a CSRF token – Drupal 8 – Cross
Site Request Forgery – Moderately Critical – CVE-2017-6379

* Samuel Mortenson [6]

.. Remote code execution – Drupal 8 – Remote code execution – Moderately
Critical – CVE-2017-6381

* Timo Hilsdorf [7]

——– FIXED BY
————————————————————

.. Editor module incorrectly checks access to inline private files – Drupal 8
– Access Bypass – Critical – CVE-2017-6377

* László Csécsy [8]
* Wim Leers [9]
* Alex Pott [10] of the Drupal Security Team
* Klaus Purer [11] of the Drupal Security Team

.. Some admin paths were not protected with a CSRF token – Drupal 8 – Cross
Site Request Forgery – Moderately Critical – CVE-2017-6379

* Samuel Mortenson [12]
* Sascha Grossenbacher

.. Remote code execution – Drupal 8 – Remote code execution -Moderately
Critical – CVE-2017-6381

* Klaus Purer [13] Of the Drupal Security Team
* Mixologic [14]

——– CONTACT AND MORE INFORMATION
—————————————-

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [15].

Learn more about the Drupal Security team and their policies [16], writing
secure code for Drupal [17], and securing your site [18].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [19]

[1] http://ftp.drupal.org/files/projects/drupal-8.2.7.tar.gz
[2] https://www.drupal.org/upgrade
[3] https://www.drupal.org/project/drupal/releases/8.2.7
[4] https://www.drupal.org/project/drupal
[5] https://www.drupal.org/u/casey
[6] http://drupal.org/u/samuel.mortenson
[7] https://www.drupal.org/user/3506593
[8] https://www.drupal.org/u/Boobaa
[9] https://www.drupal.org/u/wim-leers
[10] https://www.drupal.org/u/alexpott
[11] https://www.drupal.org/u/klausi
[12] https://www.drupal.org/u/samuel.mortenson
[13] https://www.drupal.org/u/klausi
[14] https://www.drupal.org/u/Mixologic
[15] https://www.drupal.org/contact
[16] https://www.drupal.org/security-team
[17] https://www.drupal.org/writing-secure-code
[18] https://www.drupal.org/security/secure-configuration
[19] https://twitter.com/drupalsecurity

_______________________________________________
Security-news mailing list
Security-news@drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-03-0128-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost Cisco Tidal Enterprise Scheduler Client Manager poslužitelja

Otkrivena je ranjivost u Client Manager poslužitelju Cisco Workload Automation i Cisco Tidal Enterprise Scheduler proizvoda. Ranjivost je uzrokovana nedostatnom...

Close