This repository has been archived by the owner on Mar 28, 2023. It is now read-only.
Update dependency drupal/core to v9 [SECURITY] #117
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
8.9.20
->9.3.19
GitHub Vulnerability Alerts
CVE-2022-25271
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
CVE-2022-25270
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
CVE-2022-25275
In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system.
Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability.
This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9)
$config['image.settings']['allow_insecure_derivatives']
or (Drupal 7)$conf['image_allow_insecure_derivatives']
to TRUE. The recommended and default setting is FALSE, and Drupal core does not provide a way to change that in the admin UI.Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing files or image styles after updating.
CVE-2022-25277
Drupal core sanitizes filenames with dangerous extensions upon upload and strips leading and trailing dots from filenames to prevent uploading server configuration files.
However, the protections for these two vulnerabilities previously did not work correctly together. As a result, if the site were configured to allow the upload of files with an htaccess extension, these files' filenames would not be properly sanitized. This could allow bypassing the protections provided by Drupal core's default .htaccess files and possible remote code execution on Apache web servers.
This issue is mitigated by the fact that it requires a field administrator to explicitly configure a file field to allow htaccess as an extension (a restricted permission), or a contributed module or custom code that overrides allowed file uploads.
Release Notes
drupal/core
v9.3.19
Compare Source
v9.3.18
Compare Source
v9.3.17
Compare Source
v9.3.16
Compare Source
v9.3.15
Compare Source
v9.3.14
Compare Source
v9.3.13
Compare Source
v9.3.12
Compare Source
v9.3.11
Compare Source
v9.3.10
Compare Source
v9.3.9
Compare Source
v9.3.8
Compare Source
v9.3.7
Compare Source
v9.3.6
Compare Source
v9.3.5
Compare Source
v9.3.4
Compare Source
v9.3.3
Compare Source
v9.3.2
Compare Source
v9.3.1
Compare Source
v9.3.0
Compare Source
v9.2.21
Compare Source
v9.2.20
Compare Source
v9.2.19
Compare Source
v9.2.18
Compare Source
v9.2.17
Compare Source
v9.2.16
Compare Source
v9.2.15
Compare Source
v9.2.14
Compare Source
v9.2.13
Compare Source
v9.2.12
Compare Source
v9.2.11
Compare Source
v9.2.10
Compare Source
v9.2.9
Compare Source
v9.2.8
Compare Source
v9.2.7
Compare Source
v9.2.6
Compare Source
v9.2.5
Compare Source
v9.2.4
Compare Source
v9.2.3
Compare Source
v9.2.2
Compare Source
v9.2.1
Compare Source
v9.2.0
Compare Source
v9.1.15
Compare Source
v9.1.14
Compare Source
v9.1.13
Compare Source
v9.1.12
Compare Source
v9.1.11
Compare Source
v9.1.10
Compare Source
v9.1.9
Compare Source
v9.1.8
Compare Source
v9.1.7
Compare Source
v9.1.6
Compare Source
v9.1.5
Compare Source
v9.1.4
Compare Source
v9.1.3
Compare Source
v9.1.2
Compare Source
v9.1.1
Compare Source
v9.1.0
Compare Source
v9.0.14
Compare Source
v9.0.13
Compare Source
v9.0.12
Compare Source
v9.0.11
Compare Source
v9.0.10
Compare Source
v9.0.9
Compare Source
v9.0.8
Compare Source
v9.0.7
Compare Source
v9.0.6
Compare Source
v9.0.5
Compare Source
v9.0.4
Compare Source
v9.0.3
Compare Source
v9.0.2
Compare Source
v9.0.1
Compare Source
v9.0.0
Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.