From 876ae232232b11cc0975ca1164d13ebbfeb12237 Mon Sep 17 00:00:00 2001 From: github-actions <41898282+github-actions[bot]@users.noreply.github.com> Date: Wed, 28 Jan 2026 18:24:09 +0000 Subject: [PATCH] feat: update advisories --- .../canvas/DRUPAL-CONTRIB-2026-006.json | 52 +++++++++++++++ .../cas_server/DRUPAL-CONTRIB-2026-007.json | 66 +++++++++++++++++++ 2 files changed, 118 insertions(+) create mode 100644 advisories/canvas/DRUPAL-CONTRIB-2026-006.json create mode 100644 advisories/cas_server/DRUPAL-CONTRIB-2026-007.json diff --git a/advisories/canvas/DRUPAL-CONTRIB-2026-006.json b/advisories/canvas/DRUPAL-CONTRIB-2026-006.json new file mode 100644 index 00000000..741f2e8e --- /dev/null +++ b/advisories/canvas/DRUPAL-CONTRIB-2026-006.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.7.0", + "id": "DRUPAL-CONTRIB-2026-006", + "modified": "2026-01-28T17:28:31.000Z", + "published": "2026-01-28T17:28:31.000Z", + "aliases": [ + "CVE-2026-1553" + ], + "details": "This Drupal Canvas module is a new visual page builder for Drupal. You can create reusable components that match your design system, drag them onto a page, edit content in place, preview changes across multiple pages, and undo mistakes with ease.\n\nThe module doesn't sufficiently validate access to Canvas Pages when they are unpublished.\n\nThis vulnerability is mitigated by the fact that Canvas Pages don't have content moderation enabled by default, and they must be unpublished after being released, and archiving is not a feature provided by the module yet.", + "affected": [ + { + "package": { + "ecosystem": "Packagist:https://packages.drupal.org/8", + "name": "drupal/canvas" + }, + "severity": [], + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.0.4" + } + ], + "database_specific": { + "constraint": "<1.0.4" + } + } + ], + "database_specific": { + "affected_versions": "<1.0.4" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://www.drupal.org/sa-contrib-2026-006" + } + ], + "credits": [ + { + "name": "jschref", + "contact": [ + "https://www.drupal.org/u/jschref" + ] + } + ] +} diff --git a/advisories/cas_server/DRUPAL-CONTRIB-2026-007.json b/advisories/cas_server/DRUPAL-CONTRIB-2026-007.json new file mode 100644 index 00000000..ff5d3ac1 --- /dev/null +++ b/advisories/cas_server/DRUPAL-CONTRIB-2026-007.json @@ -0,0 +1,66 @@ +{ + "schema_version": "1.7.0", + "id": "DRUPAL-CONTRIB-2026-007", + "modified": "2026-01-28T17:29:32.000Z", + "published": "2026-01-28T17:29:32.000Z", + "aliases": [ + "CVE-2026-1554" + ], + "details": "This module enables you to turn a Drupal install into the Central Authentication System (CAS). It makes your database the primary location for other systems to use for authentication in a SSO environment.\n\nThe module doesn't sufficiently sanitize user-supplied field values configured to be included as attributes in a CAS server response.\n\nThis vulnerability is mitigated by the fact that an attacker must be authenticated, have the ability to enter XML into a user entity field, and that field be configured as a CAS Attribute source leading to an XML Element Injection vulnerability.", + "affected": [ + { + "package": { + "ecosystem": "Packagist:https://packages.drupal.org/8", + "name": "drupal/cas_server" + }, + "severity": [], + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.0.3" + } + ], + "database_specific": { + "constraint": "<2.0.3" + } + }, + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.1.0" + }, + { + "fixed": "2.1.2" + } + ], + "database_specific": { + "constraint": ">=2.1.0 <2.1.2" + } + } + ], + "database_specific": { + "affected_versions": "<2.0.3 || >=2.1.0 <2.1.2" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://www.drupal.org/sa-contrib-2026-007" + } + ], + "credits": [ + { + "name": "Ga\u00ebl Gosset (ga\u00eblg)", + "contact": [ + "https://www.drupal.org/u/ga%C3%ABlg" + ] + } + ] +}