Drupal 7.x < 7.39 Multiple Vulnerabilities

high Nessus Plugin ID 85653

Synopsis

The remote web server is running a PHP application that is affected by multiple vulnerabilities.

Description

The remote web server is running a version of Drupal that is 7.x prior to 7.39. It is, therefore, potentially affected by the following vulnerabilities :

- A cross-site scripting vulnerability exists in the autocomplete functionality due to improper validation of input passed via requested URLs. An authenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code.
(CVE-2015-6658)

- A SQL injection vulnerability exists in the SQL comment filtering system due to improper sanitization of user-supplied input before using it in SQL queries. An authenticated, remote attacker can exploit this to inject SQL queries, resulting in the manipulation or disclosure of arbitrary data. (CVE-2015-6659)

- A cross-site request forgery vulnerability exists in the form API due to improper validation of form tokens. An authenticated, remote attacker can exploit this, via a specially crafted link, to upload arbitrary files under another user's account. (CVE-2015-6660)

- An information disclosure vulnerability exists that allows a remote, authenticated user to view the titles of nodes that they do not have access to.
(CVE-2015-6661)

- A cross-site scripting vulnerability exists due to improper validation of user-supplied input when invoking Drupal.ajax() on whitelisted HTML elements. A remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code.
(CVE-2015-6665)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Drupal version 7.39 or later.

See Also

https://www.drupal.org/SA-CORE-2015-003

https://www.drupal.org/project/drupal/releases/7.39

Plugin Details

Severity: High

ID: 85653

File Name: drupal_7_39.nasl

Version: 1.13

Type: remote

Family: CGI abuses

Published: 8/26/2015

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-6659

Vulnerability Information

CPE: cpe:/a:drupal:drupal

Required KB Items: www/PHP, installed_sw/Drupal, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 8/19/2015

Vulnerability Publication Date: 8/19/2015

Reference Information

CVE: CVE-2015-6658, CVE-2015-6659, CVE-2015-6660, CVE-2015-6661, CVE-2015-6665