FreeBSD : drupal -- multiple vulnerabilities (59a0af97-dbd4-11e5-8fa8-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Drupal Security Team reports :

- File upload access bypass and denial of service (File module -
Drupal 7 and 8 - Moderately Critical)

- Brute force amplification attacks via XML-RPC (XML-RPC server -
Drupal 6 and 7 - Moderately Critical)

- Open redirect via path manipulation (Base system - Drupal 6, 7 and 8
- Moderately Critical)

- Form API ignores access restrictions on submit buttons (Form API -
Drupal 6 - Critical)

- HTTP header injection using line breaks (Base system - Drupal 6 -
Moderately Critical)

- Open redirect via double-encoded 'destination' parameter (Base
system - Drupal 6 - Moderately Critical)

- Reflected file download vulnerability (System module - Drupal 6 and
7 - Moderately Critical)

- Saving user accounts can sometimes grant the user all roles (User
module - Drupal 6 and 7 - Less Critical)

- Email address can be matched to an account (User module - Drupal 7
and 8 - Less Critical)

- Session data truncation can lead to unserialization of user provided
data (Base system - Drupal 6 - Less Critical)

See also :

https://www.drupal.org/SA-CORE-2016-001
http://www.nessus.org/u?c653b82b

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 88977 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now