diff options
author | delphij <delphij@FreeBSD.org> | 2015-08-22 15:08:56 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2015-08-22 15:08:56 +0800 |
commit | cdc3bcbf4afecd722896e4df8a6a00f0afcbbc6b (patch) | |
tree | 7edab456cbccbe582cbf125cb41c18130fb68b65 /security | |
parent | 770a1f741cd6226e44adf507aecdbabf770485a5 (diff) | |
download | freebsd-ports-gnome-cdc3bcbf4afecd722896e4df8a6a00f0afcbbc6b.tar.gz freebsd-ports-gnome-cdc3bcbf4afecd722896e4df8a6a00f0afcbbc6b.tar.zst freebsd-ports-gnome-cdc3bcbf4afecd722896e4df8a6a00f0afcbbc6b.zip |
Document drupal multiple vulnerabilities.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 69 |
1 files changed, 69 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3221ba103861..b3774138e0e5 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,75 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="9393213d-489b-11e5-b8c7-d050996490d0"> + <topic>drupal -- multiple vulnerabilities</topic> + <affects> + <package> + <name>drupal6</name> + <range><lt>6.37</lt></range> + </package> + <package> + <name>drupal7</name> + <range><lt>7.39</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Drupal development team reports:</p> + <blockquote cite="https://www.drupal.org/SA-CORE-2015-003"> + <p>This security advisory fixes multiple vulnerabilities. + See below for a list.</p> + <h3>Cross-site Scripting - Ajax system - Drupal 7</h3> + <p>A vulnerability was found that allows a malicious + user to perform a cross-site scripting attack by + invoking Drupal.ajax() on a whitelisted HTML element.</p> + <p>This vulnerability is mitigated on sites that do not + allow untrusted users to enter HTML.</p> + <h3>Cross-site Scripting - Autocomplete system - Drupal 6 and 7</h3> + <p>A cross-site scripting vulnerability was found in + the autocomplete functionality of forms. The + requested URL is not sufficiently sanitized.</p> + <p>This vulnerability is mitigated by the fact that + the malicious user must be allowed to upload files.</p> + <h3>SQL Injection - Database API - Drupal 7</h3> + <p>A vulnerability was found in the SQL comment + filtering system which could allow a user with + elevated permissions to inject malicious code in + SQL comments.</p> + <p>This vulnerability is mitigated by the fact that + only one contributed module that the security team + found uses the comment filtering system in a way + that would trigger the vulnerability. That module + requires you to have a very high level of access + in order to perform the attack.</p> + <h3>Cross-site Request Forgery - Form API - Drupal 6 and 7</h3> + <p>A vulnerability was discovered in Drupal's form API + that could allow file upload value callbacks to run + with untrusted input, due to form token validation + not being performed early enough. This vulnerability + could allow a malicious user to upload files to the + site under another user's account.</p> + <p>This vulnerability is mitigated by the fact that + the uploaded files would be temporary, and Drupal + normally deletes temporary files automatically + after 6 hours.</p> + <h3>Information Disclosure in Menu Links - Access system - Drupal 6 and 7</h3> + <p>Users without the "access content" permission + can see the titles of nodes that they do not have + access to, if the nodes are added to a menu on the + site that the users have access to.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.drupal.org/SA-CORE-2015-003</url> + </references> + <dates> + <discovery>2015-08-19</discovery> + <entry>2015-08-22</entry> + </dates> + </vuln> + <vuln vid="2920c449-4850-11e5-825f-c80aa9043978"> <topic>OpenSSH -- PAM vulnerabilities</topic> <affects> |