You are here
Home > Preporuke > Ranjivosti Drupal CMS-a

Ranjivosti Drupal CMS-a

  • Detalji os-a: W03, LRH, LDE, LSU, FBS, HPU, MAC, FED, LGE, LUB, VIS, LMV, W08, WN7
  • Važnost: IMP
  • Operativni sustavi: O
  • Kategorije: ALL, W03, WN7, VIS, W08, HPQ, LRH, LDE, LSU, FBS, LFE, LGE, LUB, APL, LMV, WN8, W12

View online: https://www.drupal.org/SA-CORE-2014-006

* Advisory ID: DRUPAL-SA-CORE-2014-006
* Project: Drupal core [1]
* Version: 6.x, 7.x
* Date: 2014-November-19
* Security risk: 14/25 ( Moderately Critical)
AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
* Vulnerability: Multiple vulnerabilities

——– DESCRIPTION
———————————————————

…. Session hijacking (Drupal 6 and 7)

A specially crafted request can give a user access to another user’s session,
allowing an attacker to hijack a random session.

This attack is known to be possible on certain Drupal 7 sites which serve
both HTTP and HTTPS content (“mixed-mode” [3]), but it is possible there are
other attack vectors for both Drupal 6 and Drupal 7.

…. Denial of service (Drupal 7 only)

Drupal 7 includes a password hashing API to ensure that user supplied
passwords are not stored in plain text.

A vulnerability in this API allows an attacker to send specially crafted
requests resulting in CPU and memory exhaustion. This may lead to the site
becoming unavailable or unresponsive (denial of service).

This vulnerability can be exploited by anonymous users.

——– CVE IDENTIFIER(S) ISSUED
——————————————–

* /A CVE identifier [4] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./

——– VERSIONS AFFECTED
—————————————————

* Drupal core 6.x versions prior to 6.34.
* Drupal core 7.x versions prior to 7.34.

——– SOLUTION
————————————————————

Install the latest version:

* If you use Drupal 6.x, upgrade to Drupal core 6.34. [5]
* If you use Drupal 7.x, upgrade to Drupal core 7.34. [6]

If you have configured a custom password.inc file for your Drupal 7 site you
also need to make sure that it is not prone to the same denial of service
vulnerability. See also the similar security advisory for the Drupal 6
contributed Secure Password Hashes module: SA-CONTRIB-2014-113 [7]

Also see the Drupal core [8] project page.

——– REPORTED BY
———————————————————

Session hijacking:

* Aaron Averill [9]

Denial of service:

* Michael Cullum [10]
* Javier Nieto [11]
* Andrés Rojas Guerrero [12]

——– FIXED BY
————————————————————

Session hijacking:

* Klaus Purer [13] of the Drupal Security Team
* David Rothstein [14] of the Drupal Security Team
* Peter Wolanin [15] of the Drupal Security Team

Denial of service:

* Klaus Purer [16] of the Drupal Security Team
* Peter Wolanin [17] of the Drupal Security Team
* Heine Deelstra [18] of the Drupal Security Team
* Tom Phethean [19]

——– COORDINATED BY
——————————————————

* The Drupal Security Team

——– CONTACT AND MORE INFORMATION
—————————————-

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [20].

Learn more about the Drupal Security team and their policies [21], writing
secure code for Drupal [22], and securing your site [23].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [24]

[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/https-information
[4] http://cve.mitre.org/
[5] https://www.drupal.org/drupal-6.34-release-notes
[6] https://www.drupal.org/drupal-7.34-release-notes
[7] https://www.drupal.org/node/2378367
[8] https://www.drupal.org/project/drupal
[9] https://www.drupal.org/user/1317732
[10] https://www.drupal.org/u/MichaelCu
[11] https://www.drupal.org/u/jnietotn
[12] https://www.drupal.org/u/c0r3dump3d
[13] https://www.drupal.org/u/klausi
[14] https://www.drupal.org/u/David_Rothstein
[15] https://www.drupal.org/u/pwolanin
[16] https://www.drupal.org/u/klausi
[17] https://www.drupal.org/u/pwolanin
[18] https://www.drupal.org/u/Heine
[19] https://www.drupal.org/u/tsphethean
[20] https://www.drupal.org/contact
[21] https://www.drupal.org/security-team
[22] https://www.drupal.org/writing-secure-code
[23] https://www.drupal.org/security/secure-configuration
[24] https://twitter.com/drupalsecurity

_______________________________________________
Security-news mailing list
Security-news@drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news

AutorTomislav Protega
Cert idNCERT-REF-2014-11-0024-ADV
ID izvornikaDRUPAL-SA-CORE-2014-006
ProizvodDrupal
Izvorhttp://drupal.org/
Top
More in Preporuke
Sigurnosni propusti programskog paketa oxide-qt

Otkrivene su višestruke ranjivosti u biblioteci mehanizma web preglednika za Qt - oxide-qt, distribuirane s Ubuntu 14.04 LTS i 14.10....

Close