CAS - Critical - Third Party Libraries - BACKDROP-SA-CONTRIB-2023-002

Date: 
Feb 15th, 2023
Security risk: 
Critical
Vulnerabilities: 
  • Access bypass
  • Third Party Libraries

Central Authentication Services (CAS) is a commonly used Single Sign-On protocol used by many universities and large organizations. 

The module includes a copy of the phpCAS library that is maintained by a third-party. Previous versions of this library may allow an attacker to gain unauthorized access to a user account in Backdrop. This release both includes and supports an updated version of the library that addresses this issue.

For more information concerning the exploit, please visit the following URL: https://github.com/apereo/phpCAS/security/advisories/GHSA-8q72-6qq8-xv64

Advisory ID: 
BACKDROP-SA-CONTRIB-2023-002
Versions affected: 
  • CAS module versions prior to 1.x-1.0.1

File (Field) Paths - Moderately critical - Access bypass - BACKDROP-SA-CONTRIB-2022-006

Date: 
Dec 15th, 2022
Security risk: 
Moderately Critical
Vulnerability: 
Access bypass

The File (Field) Paths module extends the default functionality of Backdrop's core File module, by adding the ability to use entity-based tokens in destination paths and file names.

The module's default configuration could temporarily expose private files to anonymous visitors.

Important note: to fix the problem, database updates must be run in addition to updating the module.

It's possible to make a configuration change to mitigate this problem in the admin UI at /admin/config/media/file-system/filefield-paths - the temp file location should use either the temporary:// or private:// stream wrapper if uploaded files should not be exposed publicly.

This vulnerability is mitigated by the fact that an attacker must be able to guess the temporary path used for file upload.

Advisory ID: 
BACKDROP-SA-CONTRIB-2022-006
Versions affected: 
  • File (Field) Paths versions v1.x-1.0.1 and prior

Backdrop core - Moderately critical - Information Disclosure - BACKDROP-SA-CORE-2022-004

Date: 
Jul 20th, 2022
Security risk: 
Moderately Critical
Vulnerability: 
Information Disclosure

In some situations, the Image module does not correctly check access to image files that are not stored in the standard public files directory when generating derivative images using the image styles system.

Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability.

Some sites may require configuration changes following this security release. Review the Backdrop release notes if you have issues accessing files or image styles after updating.

Advisory ID: 
BACKDROP-SA-CORE-2022-004
Versions affected: 
  • Backdrop Core 1.22.x versions prior to 1.22.1
  • Backdrop Core 1.21.x versions prior to 1.21.6

Backdrop versions 1.20 and prior do not receive security coverage.

Backdrop core - Moderately critical - Third Party Libraries - SA-BACKDROP-CORE-2022-003

Date: 
Mar 16th, 2022
Security risk: 
Moderately Critical
Vulnerabilities: 
  • Cross Site Scripting
  • Third Party Libraries

The Backdrop project uses the CKEditor library for rich-text editing. CKEditor has released a security update that impacts Backdrop.

If a Backdrop site is configured to use CKEditor for rich-text editing, an attacker that can create or edit content (even without access to CKEditor themselves) may be able to exploit one or more Cross-Site Scripting (XSS) vulnerabilities. Victims may be people who later edit that content using CKEditor, including site admins with privileged access.

For more information, see CKEditor's security advisories:

 

Advisory ID: 
BACKDROP-SA-CORE-2022-003
Versions affected: 
  • Backdrop Core 1.21.x versions prior to 1.21.4
  • Backdrop Core 1.20.x versions prior to 1.20.7

Backdrop versions 1.19 and prior do not receive security coverage.

Backdrop core - Moderately critical - Cross Site Scripting - BACKDROP-SA-CORE-2022-002

Date: 
Mar 2nd, 2022
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

Backdrop CMS doesn't sufficiently sanitize certain interface text when adding links to existing content.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to create content (nodes), files, user accounts, taxonomy terms, views, or layouts.

Advisory ID: 
BACKDROP-SA-CORE-2022-002
Versions affected: 
  • Backdrop Core 1.21.x versions prior to 1.21.3
  • Backdrop Core 1.20.x versions prior to 1.20.6

Backdrop versions 1.19 and prior do not receive security coverage.

Navbar - Moderately critical - Cross Site Scripting - BACKDROP-SA-CONTRIB-2022-005

Date: 
Feb 21st, 2022
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

This module provides a very simple, mobile-friendly navigation toolbar.

The module doesn't sufficiently check for user-provided input.

This vulnerability is mitigated by the fact that an attacker must have the ability to post content using a text format (like the default "Filtered HTML" format) that won't filter out the exploit code.

Advisory ID: 
BACKDROP-SA-CONTRIB-2022-005
Versions affected: 
  • Navbar versions prior to 1.x-1.8.0

 

Backdrop core - Moderately critical - Improper input validation - BACKDROP-SA-CORE-2022-001

Date: 
Feb 16th, 2022
Security risk: 
Moderately Critical
Vulnerability: 
Improper input validation

Backdrop core's Form API has a vulnerability where certain forms in contributed or custom modules may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.

Advisory ID: 
BACKDROP-SA-CORE-2022-001
Versions affected: 
  • Backdrop Core 1.21.x versions prior to 1.21.2
  • Backdrop Core 1.20.x versions prior to 1.20.5

Backdrop versions 1.19 and prior do not receive security coverage.

Colorbox - Moderately Critical - Cross Site Scripting - BACKDROP-SA-CONTRIB-2022-007

Date: 
Feb 2nd, 2022
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

The colorbox module is a light-weight, customizable lightbox plugin for jQuery that allows images or content can be displayed in a popup or modal "lightbox" above the current page.

Colorbox did not sufficiently sanitize urls, captions, or the title attribute in some situations.

This vulnerability is mitigated by the fact that your site must have enabled the Colorbox feature to use captions, title attributes, and/or external URLs in order to have been at risk. Additionally, an attacker must have had access to an unsanitized text format, or a format that was otherwise adapted to allow the use of colorboxes.

Advisory ID: 
BACKDROP-SA-CONTRIB-2022-007
Versions affected: 
  • Colorbox module versions prior to 1.x-2.16.0

jQuery UI 1.13.0 included in Backdrop 1.21.0 - PSA-2022-001

Date: 
Jan 19th, 2022
Security risk: 
Moderately Critical
Vulnerability: 
Cross Site Scripting

There will be no additional Backdrop release today. The version of jQuery UI included in Backdrop CMS is up to date as of the latest Backdrop release, version 1.21.0, out January 15th, 2022.

Earlier versions of Backdrop core did not use the parts of the jQuery UI library that were affected by the following vulnerabilities. It is possible that they may still be exploitable with  contributed modules if they were to use those parts of the jQuery UI library. There are no known instances of this happening.

jQuery UI is a third-party library included in Backdrop CMS. This library was previously thought to be end-of-life.

Late in 2021, jQuery UI announced that they would be continuing development, and released a jQuery UI 1.13.0 version. As part of this 1.13.0 update, they disclosed the following security issues that may affect Backdrop sites that have not yet updated to 1.21.0:

Note: All other vulnerabilities that were previously unaddressed in the version of jQuery UI included in Drupal 7 do not effect any version of Backdrop CMS.

Versions affected: 
  • Backdrop Core 1.x.x versions prior to 1.21.0

Pages