Vulnerability from drupal
Published
2020-07-29 12:23
Modified
2023-08-11 17:46
Summary
Details

This module enables you to hand out permissions on a smaller subset, section or community of your website.

The module used to leverage the node grants system but turned it off in its recent 8.x-1.0 release in favor of a system that works for ALL entity types, not just nodes. By doing so, some regular node access checks turned from neutral into allowed because of the way the node grants system operates.

This vulnerability is mitigated by the fact that the victim must have the GroupNode plugin installed on their website and have no other hook_node_grants() implementations on their website aside from the one that was recently removed by Group. If you do not use the GroupNode plugin or still have hook_node_grants() implementing modules enabled, your site may not be affected.

Credits
Kristiaan Van den Eynde www.drupal.org/user/1345130

{
  "affected": [
    {
      "database_specific": {
        "affected_versions": "1.0.0"
      },
      "package": {
        "ecosystem": "Packagist:https://packages.drupal.org/8",
        "name": "drupal/group"
      },
      "ranges": [
        {
          "database_specific": {
            "constraint": "1.0.0"
          },
          "events": [
            {
              "introduced": "1.0.0"
            },
            {
              "last_affected": "1.0.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ],
      "severity": []
    }
  ],
  "aliases": [],
  "credits": [
    {
      "contact": [
        "https://www.drupal.org/user/1345130"
      ],
      "name": "Kristiaan Van den Eynde"
    }
  ],
  "details": "This module enables you to hand out permissions on a smaller subset, section or community of your website.\n\nThe module used to leverage the node grants system but turned it off in its recent 8.x-1.0 release in favor of a system that works for ALL entity types, not just nodes. By doing so, some regular node access checks turned from neutral into allowed because of the way the node grants system operates.\n\nThis vulnerability is mitigated by the fact that the victim must have the GroupNode plugin installed on their website and have no other `hook_node_grants()` implementations on their website aside from the one that was recently removed by Group. If you do not use the GroupNode plugin or still have `hook_node_grants()` implementing modules enabled, your site may not be affected.",
  "id": "DRUPAL-CONTRIB-2020-030",
  "modified": "2023-08-11T17:46:26.000Z",
  "published": "2020-07-29T12:23:17.000Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://www.drupal.org/sa-contrib-2020-030"
    }
  ],
  "schema_version": "1.7.0"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…