This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
Fixes SA-CORE-2009-007 ( http://drupal.org/node/507572 ). Remember to
log in to your site as the admin user before upgrading this package.
After upgrading the package, browse to http://host/drupal/update.php
to run the upgrade script. Multiple vulnerabilities and weaknesses
were discovered in Drupal. Cross-site scripting The Forum module does
not correctly handle certain arguments obtained from the URL. By
enticing a suitably privileged user to visit a specially crafted URL,
a malicious user is able to insert arbitrary HTML and script code into
forum pages. Such a cross-site scripting attack may lead to the
malicious user gaining administrative access. Wikipedia has more
information about cross-site scripting (XSS). This issue affects
Drupal 6.x only. Input format access bypass User signatures have no
separate input format, they use the format of the comment with which
they are displayed. A user will no longer be able to edit a comment
when an administrator changes the comment's input format to a format
that is not accessible to the user. However they will still be able to
modify their signature, which will then be processed by the new input
format. If the new format is very permissive, via their signature, the
user may be able to insert arbitrary HTML and script code into pages
or, when the PHP filter is enabled for the new format, execute PHP
code. This issue affects Drupal 6.x only. Password leaked in URL When
an anonymous user fails to login due to mistyping his username or
password, and the page he is on contains a sortable table, the
(incorrect) username and password are included in links on the table.
If the user visits these links the password may then be leaked to
external sites via the HTTP referer. In addition, if the anonymous
user is enticed to visit the site via a specially crafted URL while
the Drupal page cache is enabled, a malicious user might be able to
retrieve the (incorrect) username and password from the page cache.
This issue affects both Drupal 5.x and Drupal 6.x
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected drupal package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true