Информационная безопасность
[RU] switch to English


Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:20 сентября 2010 г.
Источник:
SecurityVulns ID:11157
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:E107 : e107 0.7
 DRUPAL : Drupal 6.6
 FREESIMPLESOFT : Free Simple CMS 1.0
CVE:CVE-2010-3094 (Multiple cross-site scripting (XSS) vulnerabilities in Drupal 6.x before 6.18 allow remote authenticated users with certain privileges to inject arbitrary web script or HTML via (1) an action description, (2) an action message, (3) a node, or (4) a taxonomy term, related to the actions feature and the trigger module.)
 CVE-2010-3093 (The comment module in Drupal 5.x before 5.23 and 6.x before 6.18 allows remote authenticated users with certain privileges to bypass intended access restrictions and reinstate removed comments via a crafted URL, related to an "unpublishing bypass" issue.)
 CVE-2010-3092 (The upload module in Drupal 5.x before 5.23 and 6.x before 6.18 does not properly support case-insensitive filename handling in a database configuration, which allows remote authenticated users to bypass the intended restrictions on downloading a file by uploading a different file with a similar name.)
 CVE-2010-3091 (The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.)
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 2113-1] New drupal6 packages fix several vulnerabilities (20.09.2010)
 documentHigh-Tech Bridge Security Research, SQL injection vulnerability in e107 (20.09.2010)
 documentHigh-Tech Bridge Security Research, SQL injection vulnerability in e107 (20.09.2010)
 documentAndrea Barisani, [oCERT-2010-003] Free Simple CMS path sanitization errors (20.09.2010)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород