Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit ca99dae

Browse files
authoredMay 22, 2023
Merge pull request #38 from YCloudYUSA/af-security-notice
docs: Add Activity Finder security notice
2 parents 3257612 + cbe20e0 commit ca99dae

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed
 
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: Activity Finder Security Notice
3+
date: 2023-04-18
4+
description: Trusted hosts settings are now required for sites that use Activity Finder.
5+
---
6+
7+
## Summary
8+
9+
Activity Finder could provide an attack vector where a malicious site could use the “trusted” YMCA domain to redirect users to an untrusted site.
10+
11+
Sites using Activity Finder should immediately ensure they have `activity_finder_trusted_redirect_host_patterns` configured in settings.php as per [the documentation](https://github.com/YCloudYUSA/yusaopeny_activity_finder#trusted-redirect-host-patterns) and update to the [latest release of Activity Finder](https://github.com/YCloudYUSA/yusaopeny_activity_finder/releases/).
12+
13+
## What is the problem?
14+
15+
[Activity Finder](https://github.com/YCloudYUSA/yusaopeny_activity_finder) provides a method for sites to redirect users to register for activities. The method passes a URL in a query string, like `exampleymca.org/af/register-redirect/1234?url=https://exampleactivities.com...`.
16+
17+
Activity Finder provides a method to [only allow trusted hosts](https://github.com/YCloudYUSA/yusaopeny_activity_finder#trusted-redirect-host-patterns) to be redirected, but **if no trusted host is configured then any host was previously allowed through**.
18+
19+
This could provide an attack vector where a malicious site could use the "trusted" YMCA domain to redirect users to an untrusted site, like `exampleymca.org/af/register-redirect/1234?url=https://examplephishers.net`.<br>
20+
21+
## How bad is it?
22+
23+
Using the [Drupal Security Risk Calculator](https://security.drupal.org/riskcalc) this risk has been assessed as 12/25 (Moderately Critical): `AC:Basic/A:None/CI:None/II:None/E:Exploit/TD:Default`.
24+
25+
Here's what that means:
26+
27+
* Access complexity: It is trivial for an attacker to leverage the vulnerability.
28+
* Authentication: No authentication is needed for an exploit to be successful.
29+
* Confidentiality Impact: The vulnerability does not cause non-public data to become accessible.
30+
* Integrity Impact: The vulnerability can not allow system data to be compromised.
31+
* Zero-day Impact: An documented exploit does exist in the wild.
32+
* Target Distribution: Default module configurations are exploitable, but a config change can disable the exploit.
33+
34+
## What do we do?
35+
36+
There are two mitigations, available to you to use immediately:
37+
38+
1. If your site is actively using Activity Finder, you should immediately ensure your site has the `activity_finder_trusted_redirect_host_patterns`configured in `settings.php` as per [the documentation](https://github.com/YCloudYUSA/yusaopeny_activity_finder#trusted-redirect-host-patterns). After deploying this change and clearing caches, your site will be secure. **If you do not make this change**, your Activity Finder links may stop redirecting on your next code update.
39+
2. If your site is not actively using Activity Finder, update to the [latest release of Activity Finder](https://github.com/YCloudYUSA/yusaopeny_activity_finder/releases/tag/4.1.15) or [include this patch](https://github.com/YCloudYUSA/yusaopeny_activity_finder/pull/9) to enforce the security of your site, as the Activity Finder code could still be active even though it's not being used.

0 commit comments

Comments
 (0)
Please sign in to comment.