You are here
Home > Preporuke > Ranjivosti Drupal CMS-a

Ranjivosti Drupal CMS-a

  • Detalji os-a: W03, LRH, LDE, LSU, FBS, HPU, MAC, FED, LGE, LUB, VIS, LMV, W08, WN7
  • Važnost: IMP
  • Operativni sustavi: O
  • Kategorije: ALL, W03, WN7, VIS, W08, HPQ, LRH, LDE, LSU, FBS, LFE, LGE, LUB, APL, LMV, WN8, W12

View online:

* Advisory ID: DRUPAL-SA-CORE-2014-006
* Project: Drupal core [1]
* Version: 6.x, 7.x
* Date: 2014-November-19
* Security risk: 14/25 ( Moderately Critical)
AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
* Vulnerability: Multiple vulnerabilities


…. Session hijacking (Drupal 6 and 7)

A specially crafted request can give a user access to another user’s session,
allowing an attacker to hijack a random session.

This attack is known to be possible on certain Drupal 7 sites which serve
both HTTP and HTTPS content (“mixed-mode” [3]), but it is possible there are
other attack vectors for both Drupal 6 and Drupal 7.

…. Denial of service (Drupal 7 only)

Drupal 7 includes a password hashing API to ensure that user supplied
passwords are not stored in plain text.

A vulnerability in this API allows an attacker to send specially crafted
requests resulting in CPU and memory exhaustion. This may lead to the site
becoming unavailable or unresponsive (denial of service).

This vulnerability can be exploited by anonymous users.


* /A CVE identifier [4] will be requested, and added upon issuance, in
with Drupal Security Team processes./


* Drupal core 6.x versions prior to 6.34.
* Drupal core 7.x versions prior to 7.34.


Install the latest version:

* If you use Drupal 6.x, upgrade to Drupal core 6.34. [5]
* If you use Drupal 7.x, upgrade to Drupal core 7.34. [6]

If you have configured a custom file for your Drupal 7 site you
also need to make sure that it is not prone to the same denial of service
vulnerability. See also the similar security advisory for the Drupal 6
contributed Secure Password Hashes module: SA-CONTRIB-2014-113 [7]

Also see the Drupal core [8] project page.


Session hijacking:

* Aaron Averill [9]

Denial of service:

* Michael Cullum [10]
* Javier Nieto [11]
* Andrés Rojas Guerrero [12]


Session hijacking:

* Klaus Purer [13] of the Drupal Security Team
* David Rothstein [14] of the Drupal Security Team
* Peter Wolanin [15] of the Drupal Security Team

Denial of service:

* Klaus Purer [16] of the Drupal Security Team
* Peter Wolanin [17] of the Drupal Security Team
* Heine Deelstra [18] of the Drupal Security Team
* Tom Phethean [19]


* The Drupal Security Team


The Drupal security team can be reached at security at or via the
contact form at [20].

Learn more about the Drupal Security team and their policies [21], writing
secure code for Drupal [22], and securing your site [23].

Follow the Drupal Security Team on Twitter at [24]


Security-news mailing list
Unsubscribe at

AutorTomislav Protega
Cert idNCERT-REF-2014-11-0024-ADV
ID izvornikaDRUPAL-SA-CORE-2014-006
More in Preporuke
Sigurnosni propusti programskog paketa oxide-qt

Otkrivene su višestruke ranjivosti u biblioteci mehanizma web preglednika za Qt - oxide-qt, distribuirane s Ubuntu 14.04 LTS i 14.10....