SA-CONTRIB-2015-003 – PHPlist Integration Module – SQL Injection

Description

The PHPlist Integration module provides an integration between a Drupal website and phpList newsletter manager. The module provides two main features: user sync and sending a node as a newsletter.

The module introduces a SQL Injection vulnerability to the phpList database. The Drupal database is not affected.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer PHPlist”.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.

Versions affected

  • PHPlist Integration Module 6.x-1.x versions prior to 6.x-1.7.

Drupal core is not affected. If you do not use the contributed PHPlist Integration Module module, there is nothing you need to do.

Solution

Install the latest version:

Also see the PHPlist Integration Module project page.

Reported by

  • Pere Orga provisional member of the Drupal Security Team

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

SA-CONTRIB-2015-002 – Course – Cross Site Scripting (XSS)

Description

Course module enables you to create e-learning courses with any number of requirements for completion.

The module doesn’t sufficiently filter node title displays when being used in a course.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission to create course content.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.

Versions affected

  • Course 7.x-1.x versions prior to 7.x-1.4
  • Course 6.x-1.x versions prior to 6.x-1.2

Drupal core is not affected. If you do not use the contributed Course module,
there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Course module for Drupal 7.x, upgrade to Course 7.x-1.4
  • If you use the Course module for Drupal 6.x, upgrade to Course 6.x-1.2

Also see the Course project page.

Reported by

  • Pere Orga provisional member of the Drupal Security Team

Fixed by

Coordinated by

  • Pere Orga provisional member of the Drupal Security Team

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

SA-CONTRIB-2015-001 – OPAC – Cross-Site Request Forgery (CSRF)

Description

OPAC module enables you to create mappings between node fields and ILS record fields.

The module doesn’t ask for confirmation when removing a mapping, leaving this operation vulnerable to cross-site request forgery (CSRF) attacks.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.

Versions affected

  • OPAC 7.x-2.x versions prior to 7.x-2.3.

Drupal core is not affected. If you do not use the contributed OPAC module,
there is nothing you need to do.

Solution

Install the latest version:

  • If you use the OPAC module 7.x-2.0, upgrade to OPAC 7.x-2.3

Also see the OPAC project page.

Reported by

  • Pere Orga provisional member of the Drupal Security Team

Fixed by

Coordinated by

  • Pere Orga provisional member of the Drupal Security Team

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

New Emomet Variant Targets Banking, Email Credentials

Security researchers are tracking a new version of the Emomet malware that is targeting users’ banking credentials and also has the ability to steal email usernames and passwords, which are then used to send spam from compromised accounts. The new variant of Emomet has mostly been seen targeting users in Germany, but researchers at Microsoft […]