First published: Tue Feb 20 2018(Updated: )
In Drupal versions 8.4.x versions before 8.4.5 the Settings Tray module has a vulnerability that allows users to update certain data that they do not have the permissions for. If you have implemented a Settings Tray form in contrib or a custom module, the correct access checks should be added. This release fixes the only two implementations in core, but does not harden against other such bypasses. This vulnerability can be mitigated by disabling the Settings Tray module.
Credit: mlhess@drupal.org mlhess@drupal.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/drupal/core | >=8.0<8.1.0>=8.1.0<8.2.0>=8.2.0<8.3.0>=8.3.0<8.4.0>=8.4.0<8.4.5 | |
composer/drupal/drupal | >=8.0<8.1.0>=8.1.0<8.2.0>=8.2.0<8.3.0>=8.3.0<8.4.0>=8.4.0<8.4.5 | |
Drupal Drupal | >=8.4.0<8.4.5 | |
composer/drupal/drupal | >=8.4.0<8.4.5 | 8.4.5 |
composer/drupal/core | >=8.4.0<8.4.5 | 8.4.5 |
>=8.4.0<8.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6931 has a moderate severity rating as it allows unauthorized users to update certain data due to insufficient permission checks.
To fix CVE-2017-6931, you should update your Drupal version to 8.4.5 or later.
CVE-2017-6931 affects Drupal versions from 8.0 up to and including 8.4.4.
The Settings Tray module is vulnerable if implemented in contributed or custom modules without proper access checks.
If unable to update, implement strict access checks in your custom code to mitigate the risk of CVE-2017-6931.