Debian Security Advisory
DSA-1930-1 drupal6 -- several vulnerabilities
- Date Reported:
- 07 Nov 2009
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 535435, Bug 547140.
In Mitre's CVE dictionary: CVE-2009-2372, CVE-2009-2373, CVE-2009-2374.
- More information:
Several vulnerabilities have been found in drupal6, a fully-featured content management framework. The Common Vulnerabilities and Exposures project identifies the following problems:
Gerhard Killesreiter discovered a flaw in the way user signatures are handled. It is possible for a user to inject arbitrary code via a crafted user signature. (SA-CORE-2009-007)
Mark Piper, Sven Herrmann and Brandon Knight discovered a cross-site scripting issue in the forum module, which could be exploited via the tid parameter. (SA-CORE-2009-007)
Sumit Datta discovered that certain drupal6 pages leak sensitive information such as user credentials. (SA-CORE-2009-007)
Several design flaws in the OpenID module have been fixed, which could lead to cross-site request forgeries or privilege escalations. Also, the file upload function does not process all extensions properly leading to the possible execution of arbitrary code. (SA-CORE-2009-008)
The oldstable distribution (etch) does not contain drupal6.
For the stable distribution (lenny), these problems have been fixed in version 6.6-3lenny3.
For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 6.14-1.
We recommend that you upgrade your drupal6 packages.
- Fixed in:
Debian GNU/Linux 5.0 (lenny)
- Architecture-independent component:
MD5 checksums of the listed files are available in the original advisory.