Note: No new Backdrop core security updates have been released since April 18, 2019. The Backdrop core security advisory emails sent from backdropcms.org on Tue Apr 23 at 10:20pm PDT refer to issues resolved on February 21, 2018 and were sent accidentally while updating security advisory content on backdropcms.org.

Tablefield - Moderately Critical - Access bypass - SA-CONTRIB-2019-010

Date: 
May 29th, 2019
Security risk: 
Moderately Critical
Vulnerability: 
Access bypass

This module allows you to attach tabular data to any fieldable entity like a node, user, or term.

Access bypass

There's no access check for users with the "Export Tablefield Data as CSV" permission. They are able to export data from unpublished nodes or otherwise inaccessible entities.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission 'Export Tablefield Data as CSV'.

Advisory ID: 
BACKDROP-SA-CONTRIB-2019-010
Versions affected: 
  • Tablefield 1.x-2.x.x versions prior to 1.x-2.5.5

Backdrop core - Moderately critical - Cross Site Scripting - SA-CORE-2019-009

Date: 
Apr 18th, 2019
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

The jQuery project released version 3.4.0, and as part of that, disclosed a security vulnerability that affects all prior versions. As described in their release notes:

jQuery 3.4.0 includes a fix for some unintended behavior when using jQuery.extend(true, {}, ...). If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. This fix is included in jQuery 3.4.0, but patch diffs exist to patch previous jQuery versions.

It's possible that this vulnerability is exploitable with some Backdrop modules. As a precaution, this Backdrop security release backports the fix to jQuery.extend(), without making any other changes to the jQuery version 1.12.4 that is included in Backdrop core.

Advisory ID: 
BACKDROP-SA-CORE-2019-009
Versions affected: 
  • Backdrop Core 1.12.x versions prior to 1.12.6
  • Backdrop Core 1.11.x versions prior to 1.11.9

Tablefield - Critical - Remote Code Execution - SA-CONTRIB-2019-007

Date: 
Apr 17th, 2019
Security risk: 
Critical
Vulnerability: 
Remote Code Execution

The tablefield module allows you to attach tabular data to an entity.

The module doesn't sufficiently determine that the data being unserialized is the contents of a tablefield when users request a CSV export, which could lead to Remote Code Execution via Object Injection.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission 'export tablefield', and be able to insert a payload into an entity's field.

Advisory ID: 
BACKDROP-SA-CONTRIB-2019-007
Versions affected: 
  • Tablefield 2.5.x versions prior to 2.5.4

Services - Less critical - Access bypass - SA-CONTRIB-2019-006

Date: 
Apr 4th, 2019
Security risk: 
Less Critical
Vulnerability: 
Access bypass

This module provides a standardized solution for building API's so that external clients can communicate with Backdrop.

The Services module has an access bypass vulnerability in its "attach_file" resource that allows users who have access to create or update pieces of content that include file fields to arbitrarily reference files they do not have access to, which can expose private files.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to create or edit a piece of content.

Advisory ID: 
BACKDROP-SA-CONTRIB-2019-006
Versions affected: 
  • Services 1.x versions prior to 1.x-3.0.4-beta

Back To Top - Moderately critical - Cross Site Scripting - SA-CONTRIB-2019-005

Date: 
Mar 22nd, 2019
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

This module enables you to add a button that hovers in the bottom of your screen and allows users to smoothly scroll up the page using jQuery.

The module doesn't sufficiently sanitize the code that gets printed on pages leading to a Cross Site Scripting (XSS) issue.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "access backtotop settings".

Advisory ID: 
BACKDROP-SA-CONTRIB-2019-005
Versions affected: 
  • Back To Top 1.x-1.x versions prior to 1.x-1.1.2
  • Back To Top 1.x-2.x versions prior to 1.x-2.0.2

Backdrop core - Moderately critical - Cross Site Scripting - SA-CORE-2019-008

Date: 
Mar 20th, 2019
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

Under certain circumstances the File module/subsystem allows a malicious user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.

Advisory ID: 
BACKDROP-SA-CORE-2019-008
Versions affected: 
  • Backdrop Core 1.12.x versions prior to 1.12.5
  • Backdrop Core 1.11.x versions prior to 1.11.8

Backdrop core - Less critical - Cross site scripting - SA-CORE-2019-007

Date: 
Mar 14th, 2019
Security risk: 
Less Critical
Vulnerability: 
Cross Site Scripting

The Views module included in Backdrop core doesn't sufficiently sanitize certain field types, leading to a Cross Site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that a view must display a field with the format "Full data (serialized)" and an attacker must have the ability to store malicious markup in that field.

Additional information

Note: Backdrop issues individual security advisories for separate vulnerabilities included in a release, rather than lumping "multiple vulnerabilities" into a single advisory. All advisories released today for Backdrop core:

Advisory ID: 
BACKDROP-SA-CORE-2019-007
Versions affected: 
  • Backdrop Core 1.12.x versions prior to 1.12.4
  • Backdrop Core 1.11.x versions prior to 1.11.7

Backdrop core - Moderately critical - Information disclosure - SA-CORE-2019-006

Date: 
Mar 14th, 2019
Security risk: 
Moderately Critical
Vulnerability: 
Information Disclosure

The Views module included in Backdrop core doesn't sufficiently build queries when used with exposed filters, leading to a possible information disclosure vulnerability in certain rare circumstances.

This vulnerability is mitigated by the fact that a view must have an exposed filter on a field that is used on multiple entity types, both of which are included in the view.

Additional information

Note: Backdrop issues individual security advisories for separate vulnerabilities included in a release, rather than lumping "multiple vulnerabilities" into a single advisory. All advisories released today for Backdrop core:

Advisory ID: 
BACKDROP-SA-CORE-2019-006
Versions affected: 
  • Backdrop Core 1.x.x versions prior to 1.12.4

Backdrop core - Moderately critical - Information Disclosure - SA-CORE-2019-005

Date: 
Mar 14th, 2019
Security risk: 
Moderately Critical
Vulnerability: 
Information Disclosure

The Views module included in Backdrop core doesn't sufficiently protect against argument definitions failing.

This vulnerability is mitigated by the fact that a view must have custom PHP code used as a field validator.

Additional information

Note: Backdrop issues individual security advisories for separate vulnerabilities included in a release, rather than lumping "multiple vulnerabilities" into a single advisory. All advisories released today for Backdrop core:

Advisory ID: 
BACKDROP-SA-CORE-2019-005
Versions affected: 
  • Backdrop Core 1.x.x versions prior to 1.12.4

EU Cookie Compliance - Critical - Cross site scripting - SA-CONTRIB-2019-004

Date: 
Mar 7th, 2019
Security risk: 
Critical
Vulnerability: 
Cross Site Scripting

This module addresses the General Data Protection Regulation (GDPR) that came into effect 25th May 2018, and the EU Directive on Privacy and Electronic Communications from 2012. It provides a banner where you can gather consent from the user when the website stores cookies on their computer or otherwise handles their personal information.

The module doesn't sufficiently sanitize data for some interface labels and strings shown in the cookie policy banner, opening up possibility of Cross Site Scripting exploits that can be created by somebody that has access to the admin interface of the module.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "Administer EU Cookie Compliance banner".

Advisory ID: 
BACKDROP-SA-CONTRIB-2019-004
Versions affected: 
  • EU Cookie Compliance 1.x-2.x.x versions prior to 2.26.0

Pages