FreeBSD : drupal -- multiple vulnerabilities (faca0843-6281-11da-8630-00123ffe8333)

high Nessus Plugin ID 21542

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

Some vulnerabilities have been reported in Drupal, which can be exploited by malicious people to bypass certain security restrictions, and conduct script insertion and HTTP response splitting attacks.

1) An input validation error in the filtering of HTML code can be exploited to inject arbitrary JavaScript code in submitted content, which will be executed in a user's browser session in context of an affected site when the malicious user data is viewed. Successful exploitation requires that the user has access to the full HTML input format. Ref: sa-2005-007

2) An input validation error in the attachment handling can be exploited to upload a malicious image with embedded HTML and script content, which will be executed in a user's browser session in context of an affected site when viewed directly with the Microsoft Internet Explorer browser. This can also be exploited to inject arbitrary HTTP headers, which will be included in the response sent to the user. Ref:
sa-2005-008

3) The problem is that it is possible to bypass the 'access user profile' permission. However, this cannot be exploited to modify data.
Successful exploitation requires that the server runs PHP 5. Ref:
sa-2005-009

Solution

Update the affected package.

See Also

https://www.drupal.org/files/sa-2005-007/advisory.txt

https://www.drupal.org/files/sa-2005-008/advisory.txt

https://www.drupal.org/files/sa-2005-009/advisory.txt

http://www.nessus.org/u?8e5f1765

Plugin Details

Severity: High

ID: 21542

File Name: freebsd_pkg_faca0843628111da863000123ffe8333.nasl

Version: 1.14

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/o:freebsd:freebsd, p-cpe:/a:freebsd:freebsd:drupal

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/1/2005

Vulnerability Publication Date: 12/1/2005

Reference Information

Secunia: 17824