Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-006
Project:
Date:
2022-March-21
Security risk:
Moderately critical 11∕25 AC:Complex/A:None/CI:None/II:Some/E:Theoretical/TD:Default
Vulnerability:
Third-party libraries
Affected versions:
>= 8.0.0 <9.2.16 || >= 9.3.0 <9.3.9
CVE IDs:
CVE-2022-24775
Description:
Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released a security update which may affect some Drupal sites.
We are issuing this security advisory outside our regular Drupal security release window schedule since Guzzle has already published information about the vulnerability, and vulnerabilities might exist with core, contributed modules, or custom modules that use Guzzle for outgoing requests. Guzzle has rated this vulnerability as low-risk.
This advisory is not covered by Drupal Steward.
Solution:
Install the latest version:
- If you are using Drupal 9.3, update to Drupal 9.3.9.
- If you are using Drupal 9.2, update to Drupal 9.2.16.
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.
Drupal 7 is not affected.
Reported By:
- Jeroen Tubex
- Damien McKenna of the Drupal Security Team
Fixed By:
- xjm of the Drupal Security Team
- Alex Pott of the Drupal Security Team
- Lee Rowlands of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
- Peter Wolanin of the Drupal Security Team