Drupal issues critical security alert
Drupal has issued a “highly critical” security alert after uncovering a remote code execution vulnerability in some versions of the Drupal core.
The vulnerability in the open source content management software, which already has known exploits, could allow for arbitrary PHP code execution under some circumstances.
The issue has emerged because some field types have been found not to properly sanitise data from non-form sources, the alert states.
Drupal issued the alert on 20 February and issued an update three days later warning that there are public exploits now available for the vulnerability.
According to the company, sites are at risk if they are running versions of Drupal 8 and have particular web service modules enabled or allow PATCH or POST requests.
Drupal’s security team has issued patches for the vulnerability for both the Drupal 8.6.x and Drupal 8.5.x branches, and has advised that no core update is required for Drupal 7. Versions of Drupal prior to 8.5.x have been discontinued.
The vulnerability can be mitigated immediately prior to patching by disabling all web services modules, or by configuring web servers not to allow GET, PUT, PATCH or POST requests to web service resources.
Information Technology Professionals Association (ITPA) is a not-for-profit organisation focused on continual professional development for its 18,700 members. To learn more about becoming an ITPA member, and the range of training opportunities, mentoring programs, events and online forums available, go to www.itpa.org.au.
Govt unveils code of practice to boost IoT security
The Australian Government has released a code of practice for IoT devices like smart televisions...
Career opportunities booming in RPA
UiPath has revealed that the COVID-19 pandemic has increased demand for robotic process...
Magento 1 still in wide use despite reaching end of life
Adobe has issued the final patches for version 1 of the popular e-commerce platform Magento, but...