The Drupal Security Team fixed some of security issues in version 7 and 8 of its content management system core engine this week that could have led to cache poisoning, social engineering attacks and a denial of service attack.
Drupal fixed four vulnerabilities marked and less critical. These vulnerabilities affect Drupal core 7.x versions prior to 7.52 and Drupal core 8.x versions prior to 8.2.3.
One of the moderately critical issue in Drupal 8’s transliteration mechanism. This module provides one-way string transliteration and cleans file names during upload by replacing unwanted characters.
According to the advisory, A specially crafted URL can cause a denial of service via the transliterate mechanism.
Other moderately critical issue in Drupal 7’s confirmation forms which allows external urls to be injected. Under certain circumstances, malicious users could construct a URL to a confirmation form that would trick users into being redirected to a 3rd party website after interacting with the form, thereby exposing the users to potential social engineering attacks, According to Drupal security advisory .
Other two vulnerabilities marked as less critical, First One is inconsistent name for term access query issue in Drupal 7 and 8.This could have leaked information on taxonomy terms to unprivileged users. other one is incorrect cache context on password reset page issue, The user password reset form does not specify a proper cache context, which can lead to cache poisoning and unwanted content on the page.
Users of the CMS are being advised to download and update Drupal core 7.5.2 if they’re using Drupal 7.x, or Drupal core 8.2.3, if they’re using Drupal 8.