Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3873 Booking and Availability Management Tools for Drupal - Moderately critical - Access Bypass - SA-CONTRIB-2019-074 17 October 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Drupal Publisher: Drupal Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Access Confidential Data -- Existing Account Resolution: Patch/Upgrade Original Bulletin: https://www.drupal.org/sa-contrib-2019-074 - --------------------------BEGIN INCLUDED TEXT-------------------- Booking and Availability Management Tools for Drupal - Moderately critical - Access Bypass - SA-CONTRIB-2019-074 Project: Booking and Availability Management Tools for Drupal Date: 2019-October-16 Security risk: Moderately critical 11/25 AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:All Vulnerability: Access Bypass Description: The Bat module provides a foundation through which a wide range of availability management, reservation and booking use cases can be addressed. The routes used to view events don't sufficiently guard access for non-privileged users. Specifically, a user with the 'View own' permission for bat events can view others' events as well. Solution: Install the latest version: o If you use the bat module for Drupal 8.x, upgrade to bat 8.x-1.2 Also see the Booking and Availability Management Tools for Drupal project page. Reported By: o Jelle Sebreghts Fixed By: o Adrian Rollett o Lee Rowlands of the Drupal Security Team o Jelle Sebreghts Coordinated By: o Greg Knaddison of the Drupal Security Team - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXagBdWaOgq3Tt24GAQhbWBAAgkuPZU+mJnNAI6r7UsB64kBJCHzrHSg+ UHi3ENVMURzxeFYlb4tXogYbY9anOJ7yWydVkzTHn5Wu9Si/yQ/PHVDXILw1PizZ Xfj0+ql6eRUzVuMS56rLqV/pUjMqr7UTU3VKcrTbcqj+SbXdd589SC7Mvhs6Loq6 xkVzgIDRw+7tEPTljw0+XSMKBSmdq13KLDSc4sh43St6W93jF8mReq+A4ag9xhNX ly4/5btzHXF6sx5Y0otbsKD4mnCqWXyqxy98KlYndNxFxtmvZ7QSAvKG09Tb/JKB zD47zrgZRS/8MfJULGvuCPIWCYTC9T083yFmnX1zPz/Ay/ahUjAspawJrSr4mJ5T ohQNjwB2Tcpz9AnDZSBc5ElAB7a7yxG//ADsf+0BaNlRIkOV+6HfI4Qh0AjeIAKO wygajWjUD7/kVpO/LJ10IOBp0NdO00SRwPA1J+43XGq23APTLHRhEm1gUGBGNKV/ r5RUKn5m7BDfO2RXv8+nT1JAYvc0hLXEGXLQ6lJh8a8imlB78QQyBZKCpiA6NWMx yh9Z+fcNGZSAwuSee3yse8AQwwspXkmEH96ZNQ0XPrI9o+KANWHlK419kulqmZQa BtHngSsOHcZiz8GQKmi0u7s4ylSEqpfoIm4XkVcxLdHkOGW1YkXD2uMIrI9RzilU eUfmMmTHRQY= =nOC6 -----END PGP SIGNATURE-----