Fedora 11 : drupal-views-6.x.2.9-1.fc11 (2010-6356)
High Nessus Plugin ID 47432
SynopsisThe remote Fedora host is missing a security update.
DescriptionSA-CONTRIB-2010-036 - Views - multiple vulnerabilities
------------------------------------------------------ * Advisory ID:
[DRUPAL-SA-CONTRIB-2010-036](http://drupal.org/node/765022) * Project:
Views (third-party module) * Version: 5.x, 6.x * Date: 2010-April-7 * Security risk: Critical * Exploitable from: Remote * Vulnerability:
Cross Site Scripting (XSS), arbitrary code execution DESCRIPTION
In addition, the Views module does not properly sanitize file descriptions when displaying them in a view, thus the the file desciptions may be used to inject arbitrary script or HTML. Such cross site scripting  (XSS) attacks may lead to a malicious user gaining full administrative access. These vulnerabilities affect only the Drupal 6 version. The file description vulnerability is mitigated by the fact that the attacker must have permission to upload files. In both the Drupal 5 and Drupal 6 versions, users with permission to 'administer views' can execute arbitrary PHP code using the views import feature. An additional check for the permission 'use PHP for block visibility' has been added to insure that the site administrator has already granted users of the import functionality the permission to execute PHP. VERSIONS AFFECTED ----------------- * Versions of Views for Drupal 6.x prior to 6.x-2.9 * Versions of Views for Drupal 5.x prior to 5.x-1.7 Note - the 6.x-3.x branch alpha releases are affected also. If you do not use the contributed Views module, there is nothing you need to do. SOLUTION -------- Install the latest version: * If you use Views for Drupal 6.x upgrade to Views 6.x-2.9  or any later version. * If you use Views for Drupal 6.x upgrade to Views 5.x-1.7  or any later version. Also see the Views  project page. REPORTED BY ----------- * XSS via AJAX parameters reported by Angel Lozano Alcazar of S21Sec * XSS via file descriptions reported by Martin Barbella 
- PHP execution reported by Derek Wright (dww ) of the Drupal Security Team  FIXED BY -------- * Earl Miles (merlinofchaos ) Views project maintainer. CONTACT
------- The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.
-  http://en.wikipedia.org/wiki/Cross-site_scripting *  http://drupal.org/node/765088 *  http://drupal.org/node/765090 *  http://drupal.org/project/views *  http://drupal.org/user/633600 *  http://drupal.org/user/46549 *  http://drupal.org/security-team *  http://drupal.org/user/26979
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected drupal-views package.