Debian Security Advisory
DSA-1930-1 drupal6 -- several vulnerabilities
- Date Reported:
- 07 Nov 2009
- Affected Packages:
- drupal6
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 535435, Bug 547140.
In Mitre's CVE dictionary: CVE-2009-2372, CVE-2009-2373, CVE-2009-2374. - More information:
-
Several vulnerabilities have been found in drupal6, a fully-featured content management framework. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2009-2372
Gerhard Killesreiter discovered a flaw in the way user signatures are handled. It is possible for a user to inject arbitrary code via a crafted user signature. (SA-CORE-2009-007)
- CVE-2009-2373
Mark Piper, Sven Herrmann and Brandon Knight discovered a cross-site scripting issue in the forum module, which could be exploited via the tid parameter. (SA-CORE-2009-007)
- CVE-2009-2374
Sumit Datta discovered that certain drupal6 pages leak sensitive information such as user credentials. (SA-CORE-2009-007)
Several design flaws in the OpenID module have been fixed, which could lead to cross-site request forgeries or privilege escalations. Also, the file upload function does not process all extensions properly leading to the possible execution of arbitrary code. (SA-CORE-2009-008)
The oldstable distribution (etch) does not contain drupal6.
For the stable distribution (lenny), these problems have been fixed in version 6.6-3lenny3.
For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 6.14-1.
We recommend that you upgrade your drupal6 packages.
- CVE-2009-2372
- Fixed in:
-
Debian GNU/Linux 5.0 (lenny)
- Source:
- http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6-3lenny3.dsc
- http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6-3lenny3.diff.gz
- http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6.orig.tar.gz
- http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6-3lenny3.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/d/drupal6/drupal6_6.6-3lenny3_all.deb
MD5 checksums of the listed files are available in the original advisory.