Debian Security Advisory
DSA-1007-1 drupal -- several vulnerabilities
- Date Reported:
- 17 Mar 2006
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2006-1225, CVE-2006-1226, CVE-2006-1227, CVE-2006-1228.
- More information:
The Drupal Security Team discovered several vulnerabilities in Drupal, a fully-featured content management and discussion engine. The Common Vulnerabilities and Exposures project identifies the following problems:
Due to missing input sanitising a remote attacker could inject headers of outgoing e-mail messages and use Drupal as a spam proxy.
Missing input sanity checks allows attackers to inject arbitrary web script or HTML.
Menu items created with the menu.module lacked access control, which might allow remote attackers to access administrator pages.
Markus Petrux discovered a bug in the session fixation which may allow remote attackers to gain Drupal user privileges.
The old stable distribution (woody) does not contain Drupal packages.
For the stable distribution (sarge) these problems have been fixed in version 4.5.3-6.
For the unstable distribution (sid) these problems have been fixed in version 4.5.8-1.
We recommend that you upgrade your drupal package.
- Fixed in:
Debian GNU/Linux 3.1 (sarge)
- Architecture-independent component:
MD5 checksums of the listed files are available in the original advisory.