Researchers from Dell SecureWorks infiltrated a Nigerian business email spoofing and business email compromise operation, shutting down a number of money mule accounts in the process.
Monthly Archives: February 2017
Flag clear – Moderately Critical – Cross Site Request Forgery (CSRF) – SA-CONTRIB-2017-017
- Advisory ID: DRUPAL-SA-CONTRIB-2017-017
- Project: Flag clear (third-party module)
- Version: 7.x
- Date: 2017-February-15
- Security risk: 10/25 ( Moderately Critical) AC:Basic/A:Admin/CI:None/II:Some/E:Theoretical/TD:All
- Vulnerability: Cross Site Request Forgery
Description
The Flag clear module allows administrators to remove user flags for content. This functionality is often useful in user-submission use-cases, where users do not necessarily need to unflag things on their own.
The module doesn’t sufficiently protect from CSRF attacks. The unflagging links do not include a token.
This vulnerability is mitigated by the fact that an attacker must be targeting users with the ‘clear flags’ role. They must also discover a valid combination of flag, content and user IDs for flagged content.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- All Flag clear module versions prior to 7.x-2.0.
Drupal core is not affected. If you do not use the contributed Flag clear module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Flag clear module for Drupal 7.x, upgrade to Flag clear 7.x-2.0
Also see the Flag clear project page.
Reported by
- Neil Drumm of the Drupal Security Team
Fixed by
- Zak Huber the module maintainer
Coordinated by
- Peter Wolanin of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Search API Sorts – Moderately Critical – Cross Site Scripting (XSS) – SA-CONTRIB-2017-016
- Advisory ID: DRUPAL-SA-CONTRIB-2017-015
- Project: Search API sorts (third-party module)
- Version: 7.x
- Date: 2017-February-15
- Security risk: 12/25 ( Moderately Critical) AC:Complex/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All
- Vulnerability: Cross Site Scripting
Description
The Search API Sorts module allows the site administrator to configure custom sort options for their search results and expose the control interface via the core block system.
The module doesn’t sufficiently sanitise the name of the sort option which is displayed to users.
This vulnerability is mitigated by the fact that an attacker must have a role with permission ‘administer search_api’.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Search API Sorts 7.x-1.x versions prior to 7.x-1.7
Drupal core is not affected. If you do not use the contributed Search API sorts module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Search API Sorts module for Drupal 7.x, upgrade to Search API Sorts 7.x-1.7
Also see the Search API sorts project page.
Reported by
Fixed by
- Jeroen Tubex
- Jimmy Henderickx the module maintainer
Coordinated by
- Mori Sugimoto of the Drupal Security Team
- Michael Hess of the Drupal Security Team
- David Snopek of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Hotjar – Moderately Critical – Cross Site Scripting (XSS) – SA-CONTRIB-2017-015
- Advisory ID: DRUPAL-SA-CONTRIB-2017-015
- Project: Hotjar (third-party module)
- Version: 7.x, 8.x
- Date: 2017-February-15
- Security risk: 12/25 ( Moderately Critical) AC:Complex/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All
- Vulnerability: Cross Site Scripting
Description
This module enables you to add the Hotjar tracking system to your website.
The module doesn’t sufficiently sanitize the Hotjar ID when including tracking code.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer hotjar”.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Hotjar 7.x-1.x versions before 7.x-1.2
- Hotjar 8.x-1.x versions before 8.x-1.0
Drupal core is not affected. If you do not use the contributed Hotjar module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Hotjar module for Drupal 7.x upgrade to Hotjar 7.x-1.2
- If you use the Hotjar module for Drupal 8.x upgrade to Hotjar 8.x-1.0
Also see the Hotjar project page.
Reported by
Fixed by
- Vince Tikász the module maintainer
Coordinated by
- Michael Hess of the Drupal Security Team
- David Snopek of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
CVE-2016-1889
Integer overflow in the bhyve hypervisor in FreeBSD 10.1, 10.2, 10.3, and 11.0 when configured with a large amount of guest memory, allows local users to gain privilege via a crafted device descriptor.
CVE-2016-1883
The issetugid system call in the Linux compatibility layer in FreeBSD 9.3, 10.1, and 10.2 allows local users to gain privilege via unspecified vectors.
CVE-2016-1881
The kernel in FreeBSD 9.3, 10.1, and 10.2 allows local users to cause a denial of service (crash) or potentially gain privilege via a crafted Linux compatibility layer setgroups system call.
CVE-2016-1880
The Linux compatibility layer in the kernel in FreeBSD 9.3, 10.1, and 10.2 allows local users to read portions of kernel memory and potentially gain privilege via unspecified vectors, related to “handling of Linux futex robust lists.”
CVE-2016-10089
Nagios 4.2.4 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641.
CVE-2015-8979
Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.