Vulnerability from drupal
Published
2022-05-04 16:26
Modified
2023-08-10 21:00
Summary
Details

The module adds a "Clone" tab to a node. When clicked, a new node is created and fields from the previous node are populated into the new fields. This module supports paragraphs, groups, and other referenced entities.

The module has a vulnerability which allows attackers to bypass the protection to clone any group content with an access check. Users are allowed to copy other group's nodes, and if they do that, the node gets added to groups they don't have access to.

This vulnerability is mitigated by the fact it only affects sites that also use the Groups contributed module.

Credits

{
  "affected": [
    {
      "database_specific": {
        "affected_versions": "\u003c1.15.0"
      },
      "package": {
        "ecosystem": "Packagist:https://packages.drupal.org/8",
        "name": "drupal/quick_node_clone"
      },
      "ranges": [
        {
          "database_specific": {
            "constraint": "\u003c1.15.0"
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1.15.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ],
      "severity": []
    }
  ],
  "aliases": [],
  "credits": [
    {
      "contact": [
        "https://www.drupal.org/user/3191699"
      ],
      "name": "Benjamin Rasmussen"
    }
  ],
  "details": "The module adds a \"Clone\" tab to a node. When clicked, a new node is created and fields from the previous node are populated into the new fields. This module supports paragraphs, groups, and other referenced entities.\n\nThe module has a vulnerability which allows attackers to bypass the protection to clone any group content with an access check. Users are allowed to copy other group\u0027s nodes, and if they do that, the node gets added to groups they don\u0027t have access to.\n\nThis vulnerability is mitigated by the fact it only affects sites that also use the Groups contributed module.",
  "id": "DRUPAL-CONTRIB-2022-038",
  "modified": "2023-08-10T21:00:44.000Z",
  "published": "2022-05-04T16:26:47.000Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://www.drupal.org/sa-contrib-2022-038"
    }
  ],
  "schema_version": "1.7.0"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…