Fedora 13 : drupal-6.19-1.fc13 (2010-12753)

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

DRUPAL-SA-CORE-2010-002 Remember to log in to your site as the admin
user before upgrading this package. After upgrading the package,
browse to http://host/drupal/update.php to run the upgrade script, for
each site. * Advisory ID: DRUPAL-SA-CORE-2010-002 * Project: Drupal
core * Version: 5.x, 6.x * Date: 2010-August-11 * Security risk:
Critical * Exploitable from: Remote * Vulnerability: Multiple
vulnerabilities -------- DESCRIPTION
--------------------------------------------------------- Multiple
vulnerabilities and weaknesses were discovered in Drupal. .... OpenID
authentication bypass The OpenID module provides users the ability to
login to sites using an OpenID account. The OpenID module doesn't
implement all the required verifications from the OpenID 2.0 protocol
and is vulnerable to a number of attacks. Specifically: - OpenID
should verify that a 'openid.response_nonce' has not already been used
for an assertion by the OpenID provider - OpenID should verify the
value of openid.return_to as obtained from the OpenID provider -
OpenID must verify that all fields that are required to be signed are
signed These specification violations allow malicious sites to harvest
positive assertions from OpenID providers and use them on sites using
the OpenID module to obtain access to preexisting accounts bound to
the harvested OpenIDs. Intercepted assertions from OpenID providers
can also be replayed and used to obtain access to user accounts bound
to the intercepted OpenIDs. This issue affects Drupal 6.x only. A
separate security announcement and release [1] is published for the
contributed OpenID module for Drupal 5.x. .... File download access
bypass The upload module allows users to upload files and provides
access checking for file downloads. The module looks up files for
download in the database and serves them for download after access
checking. However, it does not account for the fact that certain
database configurations will not consider case differences in file
names. If a malicious user uploads a file which only differs in letter
case, access will be granted for the earlier upload regardless of
actual file access to that. This issue affects Drupal 5.x and 6.x.
.... Comment unpublishing bypass The comment module allows users to
leave comments on content on the site. The module supports
unpublishing comments by privileged users. Users with the 'post
comments without approval' permission however could craft a URL which
allows them to republish previously unpublished comments. This issue
affects Drupal 5.x and 6.x. .... Actions cross site scripting The
actions feature combined with Drupal's trigger module allows users to
configure certain actions to happen when users register, content is
submitted, and so on; through a web-based interface. Users with
'administer actions permission' can enter action descriptions and
messages which are not properly filtered on output. Users with content
and taxonomy tag submission permissions can create nodes and taxonomy
terms which are not properly sanitized for inclusion in action
messages and inject arbitrary HTML and script code into Drupal pages.
Such a cross-site scripting attack may lead to the malicious user
gaining administrative access. Wikipedia has more information about
cross-site scripting [2] (XSS). This issue affects Drupal 6.x only.
-------- VERSIONS AFFECTED
--------------------------------------------------- * Drupal 6.x
before version 6.18 or 6.19. * Drupal 5.x before version 5.23.
-------- SOLUTION
------------------------------------------------------------ Install
the latest version: * If you are running Drupal 6.x then upgrade to
Drupal 6.18 [3] or Drupal 6.19 [4]. * If you are running Drupal 5.x
then upgrade to Drupal 5.23 [5]. Drupal 5 will no longer be maintained
when Drupal 7 is released [6]. Upgrading to Drupal 6 [7] is
recommended. The security team starts a new practice of releasing both
a pure security update without other bugfixes and a security update
combined with other bug fixes and improvements. You can choose to
either only include the security update for an immediate fix (which
might require less quality assurance and testing) or more fixes and
improvements alongside the security fixes by choosing between Drupal
6.18 and Drupal 6.19. Read the announcement [8] for more information.
-------- REPORTED BY
--------------------------------------------------------- The OpenID
authentication bypass issues were reported by Johnny Bufu [9],
Christian Schmidt [10] and Heine Deelstra [11] (*). The file download
access bypass was reported by Dylan Tack [12] (*). The comment
unpublish bypass issue was reported by Heine Deelstra [13] (*). The
actions module cross site scripting was reported by Justin Klein Keane
[14] and Heine Deelstra [15] (*). (*) Member of the Drupal security
team. -------- FIXED BY
------------------------------------------------------------ The
OpenID authentication issues were fixed by Christian Schmidt [16],
Heine Deelstra [17] (*) and Damien Tournoud [18] (*). The file
download access bypass was fixed by Dave Reid [19] (*) and Neil Drumm
[20] (*). The comment unpublish bypass issue was fixed by Heine
Deelstra [21] (*). The actions module cross site scripting was fixed
by Justin Klein Keane [22] and Heine Deelstra [23] (*). (*) Member of
the Drupal security team. -------- CONTACT
------------------------------------------------------------- The
security team for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact. [1]
http://drupal.org/node/880480 [2]
http://en.wikipedia.org/wiki/Cross-site_scripting [3]
http://ftp.drupal.org/files/projects/drupal-6.18.tar.gz [4]
http://ftp.drupal.org/files/projects/drupal-6.19.tar.gz [5]
http://ftp.drupal.org/files/projects/drupal-5.23.tar.gz [6]
http://drupal.org/node/725382 [7] http://drupal.org/upgrade [8]
http://drupal.org/drupal-6.19 [9] http://drupal.org/user/226462 [10]
http://drupal.org/user/216078 [11] http://drupal.org/user/17943 [12]
http://drupal.org/user/96647 [13] http://drupal.org/user/17943 [14]
http://drupal.org/user/302225 [15] http://drupal.org/user/17943 [16]
http://drupal.org/user/216078 [17] http://drupal.org/user/17943 [18]
http://drupal.org/user/22211 [19] http://drupal.org/user/53892 [20]
http://drupal.org/user/3064 [21] http://drupal.org/user/17943 [22]
http://drupal.org/user/302225 [23] http://drupal.org/user/17943
_______________________________________________ Security-news mailing
list Security-news at drupal.org
http://lists.drupal.org/mailman/listinfo/security-news

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://drupal.org/drupal-6.19
http://drupal.org/node/725382
http://drupal.org/node/880480
http://drupal.org/upgrade
http://en.wikipedia.org/wiki/Cross-site_scripting
http://ftp.drupal.org/files/projects/drupal-5.23.tar.gz
http://ftp.drupal.org/files/projects/drupal-6.18.tar.gz
http://ftp.drupal.org/files/projects/drupal-6.19.tar.gz
http://lists.drupal.org/mailman/listinfo/security-news
http://www.nessus.org/u?f903ee21

Solution :

Update the affected drupal package.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.6
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 48329 (fedora_2010-12753.nasl)

Bugtraq ID: 42391

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now