Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2879 Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011 13 June 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Drupal Core Publisher: Drupal Operating System: UNIX variants (UNIX, Linux, OSX) Windows Resolution: Patch/Upgrade CVE Names: CVE-2022-31043 CVE-2022-31042 Original Bulletin: https://www.drupal.org/sa-core-2022-011 Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011 Project: Drupal core Date: 2022-June-10 Security risk: Moderately critical 13â\x{136}\x{149}25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon Vulnerability: Third-party libraries CVE IDs: CVE-2022-31042CVE-2022-31043Description: Updated 22:00 UTC 2022-06-10: Added steps to update without drupal/ core-recommended . Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released two security advisories: o Failure to strip the Cookie header on change in host or HTTP downgrade o Fix failure to strip Authorization header on HTTP downgrade These do not affect Drupal core, but may affect some contributed projects or custom code on Drupal sites. We are issuing this security advisory outside our regular Drupal security release window schedule since Guzzle has already published information about the vulnerabilities, and vulnerabilities might exist in contributed modules or custom modules that use Guzzle for outgoing requests. Guzzle has rated these vulnerabilities as high-risk. This advisory is not covered by Drupal Steward. Solution: Install the latest version: o If you are using Drupal 9.4, update to Drupal 9.4.0-rc2 . o If you are using Drupal 9.3, update to Drupal 9.3.16 . o If you are using Drupal 9.2, update to Drupal 9.2.21 . All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life . Drupal 7 is not affected. Advanced users may also work around this issue by temporarily using drupal/core instead of drupal/core-recommended and then updating Guzzle to the desired version. More information on managing Guzzle with Drupal 9.4 . Reported By: o GHaddon o Jeroen Tubex o Yasen Ivanov Fixed By: o Heine of the Drupal Security Team o Dave Long , provisional member of the Drupal Security Team o Damien McKenna of the Drupal Security Team o Michael Hess of the Drupal Security Team o cilefen of the Drupal Security Team o xjm of the Drupal Security Team o Benji Fisher , provisional member of the Drupal Security Team - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYqai3ckNZI30y1K9AQjh6g/7BjTjuFVkhoCgtoDQML/pMvH+THuzVag0 b1chK0vWlKeCk4csm60IaKgmZZ1mgxbotMTs8+tVdUgOSIobz5ecSXVbNn1WN9XQ yBe6BflOa2VlSHIxeOnhwOoTHvym9mxBIED/TyU8w3lw9Cx8UD/Zke+joaM6izQY ngxI8/u/PfB7yF3UTB9efkGtL2495/xXlu8OZ9w/U2abryemttpnG05OfVjg3Cl8 qzhrNeuH6lMIlkDtQDF1HivCxgLpkS+AbDu9mjwxE5xvHCOZi4quF5Wa4baEZHKy ekBSmOFc/T8vtyfdIQFwaTRPutP4lVtOpJsyoIy/TY5/z3tw5F9kL8s+1gMuPNLg xpbLv0bpVENfTbcHcPX8Xuoig+7NwAHtuznFd874aI4y/C0l/GfxnPpLzY7Tx5IA 4eNUADo/3CAcPrMxiJitIRBQJEVDiCxo7hGz7wwiNJjn2MnOOd5hx3wvtHyJC4DI y+XnstInTLRyNPASgZ0Izy6HeCCDBkPCiJxx/gDOM6mS3Ak3gM3s9bXqunHnGS9f hw9uIZ7B4cEtCJeHpVQzMWqur5bUbnuat7nJ3Owr5p8Nch+bHIGpez49VFoknQ6t 3qQr+NRg9+jrpG4RUeXwQmN7bmq/GoZ5FKllNV8oXgyOVIP5SinLaBn3vGjGBPxB vNJch4SETRI= =GGbe -----END PGP SIGNATURE-----