From 267029cafb1a238ca98b9e5410c7608978f467fc Mon Sep 17 00:00:00 2001 From: miwi Date: Mon, 8 Mar 2010 22:50:43 +0000 Subject: - Document drupal -- multiple vulnerabilities Feature safe: yep --- security/vuxml/vuln.xml | 45 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d501ecb7ee2c..4be9607b6764 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,51 @@ Note: Please add new entries to the beginning of this file. --> + + drupal -- multiple vulnerabilities + + + drupal5 + 5.22 + + + drupal6 + 6.16 + + + + +

Drupal Team reports:

+
+

A user-supplied value is directly output during installation + allowing a malicious user to craft a URL and perform a cross-site + scripting attack. The exploit can only be conducted on sites not yet + installed.

+

The API function drupal_goto() is susceptible to a phishing attack. + An attacker could formulate a redirect in a way that gets the Drupal + site to send the user to an arbitrarily provided URL. No user + submitted data will be sent to that URL.

+

Locale module and dependent contributed modules do not sanitize the + display of language codes, native and English language names properly. + While these usually come from a preselected list, arbitrary + administrator input is allowed. This vulnerability is mitigated by the + fact that the attacker must have a role with the 'administer + languages' permission.

+

Under certain circumstances, a user with an open session that is + blocked can maintain his/her session on the Drupal site, despite being + blocked.

+
+ +
+ + http://drupal.org/node/731710 + + + 2010-03-03 + 2010-03-08 + +
+ sudo -- Privilege escalation with sudoedit -- cgit