March 2017

RestWS - Moderately Critical - Information Disclosure

* Advisory ID: DRUPAL-SA-CONTRIB-2017-024
* Project: RESTful Web Services (third-party module)
* Version: 7.x
* Date: 2017-March-01
* Security risk: 12/25 ( Moderately Critical)
* Vulnerability: Information Disclosure

DESCRIPTION

RestWS makes Drupal Entity data available in a REST API.

The module doesn’t sufficiently check for access to properties when
filtering queries.

Remember Me - Critical - Unsupported

* Advisory ID: DRUPAL-SA-CONTRIB-2017-025
* Project: Remember Me (third-party module)
* Version: 7.x
* Date: 2017-March-01

DESCRIPTION

Remember me is a module that allows users to check "Remember me" when
logging in.

The security team is marking this module unsupported. There is a known
security issue with the module that has not been fixed by the maintainer. If
you would like to maintain this module, please read:
https://www.drupal.org/node/251466

Location Map - Moderately Critical - Multiple vulnerabilities

* Advisory ID: DRUPAL-SA-CONTRIB-2017-026
* Project: Location Map (third-party module)
* Version: 7.x
* Date: 2017-March-01
* Security risk: 10/25 ( Moderately Critical)
* Vulnerability: Cross Site Scripting, Access bypass

DESCRIPTION

This module enables you to display one simple location map via Google Maps.

The module doesn't sufficiently sanitize user input in the configuration text
fields of the module (allows any tags and does not respect text format
configuration).

Breakpoint Panels - Critical - Unsupported

* Advisory ID: DRUPAL-SA-CONTRIB-2017-028
* Project: breakpoint panels (third-party module)
* Version: 7.x
* Date: 2017-March-01

DESCRIPTION

Breakpoint panels adds a button to the Panels In-Place Editor for each pane.
When selected, it will display checkboxes next to all of the breakpoints
specified in that modules UI. Unchecking any of these will 'hide' it from
that breakpoint.

Services - Critical - Arbitrary Code Execution

* Advisory ID: DRUPAL-SA-CONTRIB-2016-029
* Project: Services
* Version: 7.x
* Date: 2017-March-08
* Security risk: 21/25 ( Highly Critical)
* Vulnerability: Arbitrary PHP code execution

DESCRIPTION

This module provides a standardized solution for building API's so that
external clients can communicate with Drupal.

The module accepts user submitted data in PHP's serialization format
("Content-Type: application/vnd.php.serialized") which can lead to arbitrary
remote code execution.

PRLP - Critical - Access Bypass and Privilege Escalation

* Advisory ID: DRUPAL-SA-CONTRIB-2017-030
* Project: Password Reset Landing Page (PRLP)
* Version: 8.x
* Date: 2017-March-08
* Security risk: 16/25 ( Critical)
* Vulnerability: Access bypass, Privilege escalation

DESCRIPTION

This module adds a form on the password-reset-landing page to allow changing
the password of the user during the log in process.

Private - Critical - Access bypass

* Advisory ID: DRUPAL-SA-CONTRIB-2017-031
* Project: Private (third-party module)
* Version: 7.x
* Date: 2017-March-15
* Security risk: 15/25 ( Critical)
* Vulnerability: Access bypass

DESCRIPTION

This module enables you to mark nodes as private so that they are only
accessible to users that have been granted an extra permissions.

Office Hours - Moderately Critical - Cross Site Scripting

* Advisory ID: DRUPAL-SA-CONTRIB-2017-032
* Project: Office Hours
* Version: 7.x
* Date: 2017-March-22
* Security risk: 10/25 ( Moderately Critical)
* Vulnerability: Cross Site Scripting

DESCRIPTION

This module enables you to show the office hours of a location to the public.
The module doesn't sufficiently filter user input for malicious Cross Site
Scripting (xss).

This vulnerability is mitigated by the fact that an attacker must have a role
with a permission to add fields to an entity.

Pages