Cisco Security Advisory – A vulnerability in the web-based GUI of Cisco Firepower Management Center and Cisco Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services could allow an authenticated, remote attacker to perform unauthorized remote command execution on the affected device. The vulnerability is due to insufficient authorization checking. An attacker could exploit this vulnerability by sending crafted HTTP requests to the affected device. Successful exploitation could allow an authenticated attacker to execute system commands with root-level privileges. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.
Monthly Archives: August 2016
Panelizer – Moderately Critical – Access Bypass – SA-CONTRIB-2016-048
- Advisory ID: DRUPAL-SA-CONTRIB-2014-048
- Project: Panelizer (third-party module)
- Version: 7.x
- Date: 2016-August-17
- Security risk: 12/25 ( Moderately Critical) AC:None/A:User/CI:None/II:Some/E:Theoretical/TD:Default
- Vulnerability: Access bypass
Description
Panelizer enables you to use Panels to replace the display of any entity, and even modify the Panels configuration in-place using the Panels In-Place Editor (IPE).
The default behavior for Panels IPE is to allow any user with the permissions “Use the Panels In-Place Editor” and “Change layouts with the Panels In-Place Editor ” access to the IPE regardless of whether or not a user has access to edit the underlying entity. While users cannot edit the entity itself, they can change the layout and the different panel panes shown (effectively allowing them to edit it).
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “Use the Panels In-Place Editor” and the IPE must be enabled for the specific content type.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Panelizer 7.x-3.x versions prior to 7.x-3.3.
Drupal core is not affected. If you do not use the contributed Panelizer module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Panelizer module for Drupal 7.x, upgrade to Panelizer 7.x-3.3
Also see the Panelizer project page.
Reported by
Fixed by
- Jakob Perry the module maintainer
- Damien Mckenna
- Mike Potter provisional member of the Drupal Security Team
- David Snopek of the Drupal Security Team
Coordinated by
- Mike Potter provisional member of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Browser Address Bar Spoofing Vulnerability Disclosed
Chrome, Firefox and likely other major browsers are afflicted by a vulnerability that allows attackers to spoof URLs in the address bar.
Panels – Critical – Multiple Vulnerabilities – SA-CONTRIB-2016-047
- Advisory ID: DRUPAL-SA-CONTRIB-2016-047
- Project: Panels (third-party module)
- Version: 7.x
- Date: 2016-August-17
- Security risk: 15/25 ( Critical) AC:None/A:None/CI:All/II:None/E:Theoretical/TD:All
- Vulnerability: Access bypass, Information Disclosure
Description
Panels does not check access on some routes (Critical)
Panels allows users with certain permissions to modify the layout and panel panes on pages or entities utilizing panels.
Much of the functionality to modify these panels rely on backend routes that call administrative forms. These forms did not provide any access checks, or site specific encoded urls. This can allow an attacker to guess the backend url as an anonymous user and see data loaded for the form.
There is no mitigation for this exploit. Any site with panels enabled is vulnerable.
Panels In-place Editor does not properly check for access (Moderately Critical)
The Panels In-Place Editor (IPE) allows users with certain permissions to modify the layout and panel content of pages.
The default behavior for Panels IPE is to allow any user with the permissions “Use the Panels In-Place Editor” and “Change layouts with the Panels In-Place Editor ” access to the IPE regardless of whether or not a user has proper access to the page. While users cannot edit the page content itself, they can change the layout and the different panel panes shown.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “Use the Panels In-Place Editor” and the IPE must be enabled for the specific content type.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Panels 7.x-3.x versions prior to 7.x-3.6.
Drupal core is not affected. If you do not use the contributed Panels module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the panels module for Drupal 7x, upgrade to Panels 7.x-3.6
Also see the Panels project page.
Reported by
- Pere Orga of the Drupal Security Team
- John Coltrane
- Branden Hamilton
- Joep Hendrix
Fixed by
- Jakob Perry the module maintainer
- Damien Mckenna
- Mike Potter provisional member of the Drupal Security Team
- David Snopek of the Drupal Security Team
Coordinated by
- Mike Potter provisional member of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
The NSA Hack — What, When, Where, How, Who & Why?
You might have heard about the recent ongoing drama of NSA hack that has sparked a larger debate on the Internet concerning abilities of US intelligence agencies as well as their own security.
Saturday morning the news broke that a mysterious group of hackers calling themselves “The Shadow Brokers” claimed it hacked an NSA-linked group and released some NSA hacking tools with a promise to
![]()
US Dept Of Energy Spends $34m On Securing The Smart Grid
Kaspersky Uncovers Malware Riding On The Back Of Google Adsense
New FFS Rowhammer Attack Hijacks Linux VMs
Security Researcher Turns The Tables On Scammers
Hosting – Less Critical – Access bypass – SA-CONTRIB-2016-046
- Advisory ID: DRUPAL-SA-CONTRIB-2016-046
- Project: Hosting (third-party module)
- Version: 7.x
- Date: 2016-August-17
- Security risk: 9/25 ( Less Critical) AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:Uncommon
- Vulnerability: Access bypass
Description
The Hosting module is a core component of the Aegir Hosting System.
This install profile, and accompanying suite of modules, is a hosting system that sits alongside a LAMP or LEMP server to create, deploy and manage Drupal sites.
The Hosting module does not sufficiently control access to any custom content types created by the user. The default content types are sufficiently protected.
This vulnerability is mitigated by the fact that on a typical installation the users who have access normally have admin privilege already, and few installations will have created additional custom content types.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Hosting 7.x-3.x versions prior to 7.x-3.7.
Drupal core is not affected. If you do not use the contributed Hosting module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the hosting module for Drupal 7.x, upgrade to hosting 7.x-3.7
Also see the Hosting project page.
Reported by
Fixed by
- Herman van Rink (helmo) on of the module maintainers
Coordinated by
- Michael Hess of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
