-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Dominic Hargreaves uploaded new packages for request-tracker4 which fixed the following security problems: CVE-2011-2082 The vulnerable-passwords scripts introduced for CVE-2011-0009 failed to correct the password hashes of disabled users. CVE-2011-2083 Several cross-site scripting issues have been discovered. CVE-2011-2084 Password hashes could be disclosed by privileged users. CVE-2011-2085 Several cross-site request forgery vulnerabilities have been found. If this update breaks your setup, you can restore the old behaviour by setting $RestrictReferrer to 0. CVE-2011-4458 The code to support variable envelope return paths allowed the execution of arbitrary code. CVE-2011-4459 Disabled groups were not fully accounted as disabled. CVE-2011-4460 SQL injection vulnerability, only exploitable by privileged users. For the squeeze-backports distribution the problems have been fixed in version 4.0.5-3~bpo60+1. -----BEG
Monthly Archives: May 2012
WatchGuard Earns Common Criteria EAL 4+ Certification for Latest Multifunction Firewalls and Content Security Solutions
WatchGuard Continues Pattern of Strong Growth
WatchGuard Receives Information Technology Industry's "2012 World's Best" Award for Security Hardware
WatchGuard Goes Virtual with Security
SA-CORE-2012-002 – Drupal core multiple vulnerabilities
- Advisory ID: DRUPAL-SA-CORE-2012-002
- Project: Drupal core
- Version: 7.x
- Date: 2012-May-2
- Security risk: Critical
- Exploitable from: Remote
- Vulnerability: Denial of Service, Access bypass, Unvalidated form redirect
Denial of Service
Drupal core’s text filtering system provides several features including removing inappropriate HTML tags and automatically linking content that appears to be a link. A pattern in Drupal’s text matching was found to be inefficient with certain specially crafted strings. This vulnerability is mitigated by the fact that users must have the ability to post content sent to the filter system such as a role with the “post comments” or “Forum topic: Create new content” permission.
Unvalidated form redirect
Drupal core’s Form API allows users to set a destination, but failed to validate that the URL was internal to the site. This weakness could be abused to redirect the login to a remote site with a malicious script that harvests the login credentials and redirects to the live site. This vulnerability is mitigated only by the end user’s ability to recognize a URL with malicious query parameters to avoid the social engineering required to exploit the problem.
Access bypass – forum listing
Drupal core’s forum lists fail to check user access to nodes when displaying them in the forum overview page. If an unpublished node was the most recently updated in a forum then users who should not have access to unpublished forum posts were still be able to see meta-data about the forum post such as the post title.
Access bypass – private images
Drupal core provides the ability to have private files, including images, and Image Styles which create derivative images from an original image that may differ, for example, in size or saturation. Drupal core failed to properly terminate the page request for cached image styles allowing users to access image derivatives for images they should not be able to view. Furthermore, Drupal didn’t set the right headers to prevent image styles from being cached in the browser.
Access bypass – content administration
Drupal core provides the ability to list nodes on a site at admin/content. Drupal core failed to confirm a user viewing that page had access to each node in the list. This vulnerability only concerns sites running a contributed node access module and is mitigated by the fact that users must have a role with the “Access the content overview page” permission. Unpublished nodes were not displayed to users who only had the “Access the content overview page” permission.
- Drupal core 7.x versions prior to 7.13.
Install the latest version:
- If you use Drupal 7.x, upgrade to Drupal core 7.13
Also see the Drupal core project page.
- The Denial of Service vulnerability was reported by Jay Wineinger and Lin Clark.
- The unvalidated form redirect vulnerability was reported by KÃ¡roly NÃ©gyesi of the Drupal Security Team and Katsuhiko Nakanishi.
- The access bypass in forum listing vulnerability was reported by Glen W.
- The access bypass for private images vulnerability was reported by frega, Andreas Gonell, Jeremy Meier and Xenza.
- The access bypass for the content administration vulnerability was reported by Jennifer Hodgdon.
- The Denial of Service was fixed by KÃ¡roly NÃ©gyesi of the Drupal Security Team.
- The unvalidated form redirect was fixed by Wolfgang Ziegler and StÃ©phane Corlosquet of the Drupal Security Team.
- The access bypass in forum listing was fixed by Michael Hess of the Drupal Security Team, Ben Jeavons of the Drupal Security Team and xjm.
- The Access bypass for private images was fixed by KÃ¡roly NÃ©gyesi of the Drupal Security Team, Damien Tournoud of the Drupal Security Team, Greg Knaddison of the Drupal Security Team, StÃ©phane Corlosquet of the Drupal Security Team, Xenza and frega.
- The Access bypass for content administration was fixed by Jennifer Hodgdon.
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.