diff options
author | delphij <delphij@FreeBSD.org> | 2015-06-19 08:13:25 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2015-06-19 08:13:25 +0800 |
commit | 1b93d9b506f011cd81ed56157360e38d138b6d33 (patch) | |
tree | 5b5755b0cbe2ec89e8c8d72f2e3cfa053ed9fbd2 /security | |
parent | 95e87d91c7aaa05162b54cea2dd46286ff2a29b3 (diff) | |
download | freebsd-ports-gnome-1b93d9b506f011cd81ed56157360e38d138b6d33.tar.gz freebsd-ports-gnome-1b93d9b506f011cd81ed56157360e38d138b6d33.tar.zst freebsd-ports-gnome-1b93d9b506f011cd81ed56157360e38d138b6d33.zip |
Document Drupal multiple vulnerabilities.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 76 |
1 files changed, 76 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e9071c0d588c..1dd037496d6d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,82 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="d605edb1-1616-11e5-a000-d050996490d0"> + <topic>drupal -- multiple vulnerabilities</topic> + <affects> + <package> + <name>drupal6</name> + <range><lt>6.36</lt></range> + </package> + <package> + <name>drupal7</name> + <range><lt>7.38</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Drupal development team reports:</p> + <blockquote cite="https://www.drupal.org/SA-CORE-2015-002"> + <h3>Impersonation (OpenID module - Drupal 6 and 7 - Critical)</h3> + <p>A vulnerability was found in the OpenID module that allows + a malicious user to log in as other users on the site, + including administrators, and hijack their accounts.</p> + <p>This vulnerability is mitigated by the fact that the victim + must have an account with an associated OpenID identity from + a particular set of OpenID providers (including, but not + limited to, Verisign, LiveJournal, or StackExchange).</p> + <h3>Open redirect (Field UI module - Drupal 7 - Less critical)</h3> + <p>The Field UI module uses a "destinations" query string parameter + in URLs to redirect users to new destinations after completing + an action on a few administration pages. Under certain + circumstances, malicious users can use this parameter to + construct a URL that will trick users into being redirected + to a 3rd party website, thereby exposing the users to potential + social engineering attacks.</p> + <p>This vulnerability is mitigated by the fact that only sites + with the Field UI module enabled are affected.</p> + <p>Drupal 6 core is not affected, but see the similar advisory + for the Drupal 6 contributed CCK module: + <a href="https://www.drupal.org/node/2507753">SA-CONTRIB-2015-126</a></p> + <h3>Open redirect (Overlay module - Drupal 7 - Less critical)</h3> + <p>The Overlay module displays administrative pages as a layer + over the current page (using JavaScript), rather than replacing + the page in the browser window. The Overlay module does not + sufficiently validate URLs prior to displaying their contents, + leading to an open redirect vulnerability.</p> + <p>This vulnerability is mitigated by the fact that it can only + be used against site users who have the "Access the administrative + overlay" permission, and that the Overlay module must be enabled.</p> + <h3>Information disclosure (Render cache system - Drupal 7 + - Less critical)</h3> + <p>On sites utilizing Drupal 7's render cache system to cache + content on the site by user role, private content viewed by + user 1 may be included in the cache and exposed to non-privileged + users.</p> + <p>This vulnerability is mitigated by the fact that render caching + is not used in Drupal 7 core itself (it requires custom code or + the contributed <a href="https://www.drupal.org/project/render_cache">Render + Cache</a> module to enable) and that it only affects sites that + have user 1 browsing the live site. Exposure is also limited if an + administrative role has been assigned to the user 1 account (which + is done, for example, by the Standard install profile that ships + with Drupal core).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-3231</cvename> + <cvename>CVE-2015-3232</cvename> + <cvename>CVE-2015-3233</cvename> + <cvename>CVE-2015-3234</cvename> + <url>https://www.drupal.org/SA-CORE-2015-002</url> + </references> + <dates> + <discovery>2015-06-17</discovery> + <entry>2015-06-19</entry> + </dates> + </vuln> + <vuln vid="2438d4af-1538-11e5-a106-3c970e169bc2"> <topic>cURL -- Multiple Vulnerability</topic> <affects> |