Drupal 6.x < 6.35 / 7.x < 7.35 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 9213

Synopsis

The remote web server is hosting an outdated installation of Drupal that is vulnerable to multiple attack vectors.

Description

The remote web server is hosting an outdated version of Drupal, a PHP-based open-source content management system. The version of Drupal installed on the remote server is 6.x prior to 6.35 or 7.x prior to 7.35, and is affected by the following vulnerabilities :

- An access bypass vulnerability exists in which password reset URLs can be forged. This allows a remote attacker to gain access to another user's account. (CVE-2015-2559)
- An open redirect vulnerability exists which allows a remote attacker to craft a URL using the 'destination' parameter in order to trick users into being redirected to third-party sites. Additionally, several URL related API functions can be tricked into passing external URLs. (CVE-2015-2749, CVE-2015-2750)

Solution

Upgrade to Drupal 7.35, or later. If 7.x cannot be obtained, 6.35 is also patched for these vulnerabilities.

See Also

https://www.drupal.org/SA-CORE-2015-001

https://www.drupal.org/drupal-7.35-release-notes

https://www.drupal.org/drupal-6.35-release-notes

https://www.drupal.org/security

Plugin Details

Severity: Medium

ID: 9213

Family: CGI

Published: 4/8/2016

Updated: 3/6/2019

Nessus ID: 81975

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:drupal:drupal

Patch Publication Date: 3/18/2015

Vulnerability Publication Date: 3/18/2015

Reference Information

CVE: CVE-2015-2559, CVE-2015-2749, CVE-2015-2750

BID: 73219