Debian Security Advisory
DSA-1125-2 drupal -- several vulnerabilities
- Date Reported:
- 27 Jul 2006
- Affected Packages:
- drupal
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 368835.
In Mitre's CVE dictionary: CVE-2006-2742, CVE-2006-2743, CVE-2006-2831, CVE-2006-2832, CVE-2006-2833. - More information:
-
The Drupal update in DSA 1125 contained a regression. This update corrects this flaw. For completeness, the original advisory text below:
Several remote vulnerabilities have been discovered in the Drupal web site platform, which may lead to the execution of arbitrary web script. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2006-2742
A SQL injection vulnerability has been discovered in the "count" and "from" variables of the database interface.
- CVE-2006-2743
Multiple file extensions were handled incorrectly if Drupal ran on Apache with mod_mime enabled.
- CVE-2006-2831
A variation of CVE-2006-2743 was addressed as well.
- CVE-2006-2832
A Cross-Site-Scripting vulnerability in the upload module has been discovered.
- CVE-2006-2833
A Cross-Site-Scripting vulnerability in the taxonomy module has been discovered.
For the stable distribution (sarge) these problems have been fixed in version 4.5.3-6.1sarge2.
For the unstable distribution (sid) these problems have been fixed in version 4.5.8-1.1.
We recommend that you upgrade your drupal packages.
- CVE-2006-2742
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3-6.1sarge2.dsc
- http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3-6.1sarge2.diff.gz
- http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3.orig.tar.gz
- http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3-6.1sarge2.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3-6.1sarge2_all.deb
MD5 checksums of the listed files are available in the original advisory.