Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  [NETRAGARD-20061218 SECURITY ADVISORY] [@Mail WebMail Cross Site Request Forgery]

  [SA23913] CGI Rescue WebFORM Cross-Site Scripting and HTTP Header Injection

  [SA23908] Drupal Project Module Script Insertion Vulnerability

  [SA23909] Shopping Basket Professional Command Injection

From:SECUNIA <support_(at)_secunia.com>
Date:25 января 2007 г.
Subject:[SA23887] Drupal Project Issue Tracking Module Multiple Vulnerabilities

TITLE:
Drupal Project Issue Tracking Module Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA23887

VERIFY ADVISORY:
http://secunia.com/advisories/23887/

CRITICAL:
Less critical

IMPACT:
Security Bypass, Cross Site Scripting, Manipulation of data, Exposure
of sensitive information, System access

WHERE:
>From remote

SOFTWARE:
Drupal Project issue tracking Module 4.x
http://secunia.com/product/12913/

DESCRIPTION:
Some vulnerabilities have been reported in the Project issue tracking
module for Drupal, which can be exploited by malicious users to bypass
certain security restrictions, disclose sensitive information,
manipulate data, compromise vulnerable systems or conduct script
insertion attacks.

1) An unspecified error in assembling permissions causes users to get
full access to all issues.

Successful exploitation requires valid user credentials and that the
user has the "Access project issues" permission.

2) An unspecified error in assembling permissions causes users to be
able to download confidential or private files.

Successful exploitation requires valid user credentials, that the
user has the "Access project issues" permission, that the site is
configured to use the private download method, and that the user can
guess the filenames.

3) An unspecified script fails to validate the extension(s) of an
uploaded file. This can be exploited to upload files with arbitrary
extensions (e.g. ".php" or ".php.pps") and execute arbitrary PHP code
on the server.

Successful exploitation requires valid user credentials, that the
user has the "Create project issues" permission, and that the Apache
server configuration disables "FileInfo" overrides in .htaccess
files.

4) For more information:
SA23908

The vulnerabilities are reported in version 4.7.x-2.1, 4.7.x-1.1,
4.7.0 (from before the new release system) and in 4.6.x (when the
product was a part of the Project module).

SOLUTION:
Update to version 4.7.x-2.2 or 4.7.x-1.2.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1+2) Derek Wright a.k.a dww
3) Heine Deelstra
4) Brandon Bergren a.k.a bdragon

ORIGINAL ADVISORY:
DRUPAL-SA-2007-004:
http://drupal.org/node/112146

OTHER REFERENCES:
SA23908:
http://secunia.com/advisories/23908/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород