Fedora 8 : drupal-5.12-1.fc8 (2008-9170)

High Nessus Plugin ID 34495


The remote Fedora host is missing a security update.


Update to 5.12, security fixes: SA-2008-067 ( http://drupal.org/node/324824 ) ------------DESCRIPTION------------ Multiple vulnerabilities and weaknesses were discovered in Drupal.
------------FILE INCLUSION------------ On a server configured for IP-based virtual hosts, Drupal may be caused to include and execute specifically named files outside of its root directory. This bug affects both Drupal 5 and Drupal 6. ------------CROSS SITE SCRIPTING------------ The title of book pages is not always properly escaped, enabling users with the 'create book content' permission or the permission to edit any node in the book hierarchy to insert arbitrary HTML and script code into pages. Such a Cross site scripting [ http://en.wikipedia.org/wiki/Cross-site_scripting ] attack may lead to the attacker gaining administrator access. This bug affects Drupal 6. Remember to log in to your site as the admin user before upgrading this package. After upgrading the package, browse to http://host/drupal/update.php to run the upgrade script.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected drupal package.

See Also





Plugin Details

Severity: High

ID: 34495

File Name: fedora_2008-9170.nasl

Version: $Revision: 1.14 $

Type: local

Agent: unix

Published: 2008/10/27

Modified: 2016/12/08

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:drupal, cpe:/o:fedoraproject:fedora:8

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/10/24

Reference Information

CVE: CVE-2008-6170, CVE-2008-6171

BID: 31882, 31900

FEDORA: 2008-9170

CWE: 16, 20, 79