Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 833137 - www-apps/drupal - multiple vulnerabilities (CVE-2020-{13674,13675,13676,13677})
Summary: www-apps/drupal - multiple vulnerabilities (CVE-2020-{13674,13675,13676,13677})
Status: RESOLVED DUPLICATE of bug 813492
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~4 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-02-11 19:57 UTC by filip ambroz
Modified: 2022-02-11 20:02 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description filip ambroz 2022-02-11 19:57:52 UTC
[CVE-2020-13674]
The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues.

Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.

URL: https://www.drupal.org/sa-core-2021-007
Fix: update to Drupal 9.2.6, 9.1.13, 8.9.19


[CVE-2020-13675]
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.

This vulnerability is mitigated by three factors:
1. The JSON:API or REST File upload modules must be enabled on the site.
2. An attacker must have access to a file upload via JSON:API or REST.
3. The site must employ a file validation module.

URL: https://www.drupal.org/sa-core-2021-008
Fix: update to Drupal 9.2.6, 9.1.13, 8.9.19


[CVE-2020-13676]
The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data.

Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.

URL: https://www.drupal.org/sa-core-2021-009
Fix: update to Drupal 9.2.6, 9.1.13, 8.9.19


[CVE-2020-13677]
Under some circumstances, the Drupal core JSON:API module does not properly restrict access to certain content, which may result in unintended access bypass.

Sites that do not have the JSON:API module enabled are not affected.

URL: https://www.drupal.org/sa-core-2021-010
Fix: update to Drupal 9.2.6, 9.1.13, 8.9.19
Comment 1 filip ambroz 2022-02-11 20:02:03 UTC

*** This bug has been marked as a duplicate of bug 813492 ***