it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecurityNotifies] [Security-news] SA-CONTRIB-2010-098 - Memcache - Multiple vulnerabilities
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecurityNotifies] [Security-news] SA-CONTRIB-2010-098 - Memcache - Multiple vulnerabilities
- Date: Thu, 30 Sep 2010 00:44:40 +0000 (UTC)
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
* Advisory ID: DRUPAL-SA-CONTRIB-2010-098
* Project: memcache (third-party module)
* Version: 5.x, 6.x
* Date: 2010-September-29
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Access bypass, Cross-Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Memcache project [1] provides an alternative cache backend which works
with memcached program to speed up high traffic sites.
The memcache backend caches the current $user object a little too
aggressively, which can lead to a role change not being recognized until the
user logs in again.
The memcache_admin module does not sanitize some of the user supplied data
before displaying it, leading to a Cross Site Scripting (XSS [2])
vulnerability which can be used by a malicious user to gain full
administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Memcache for Drupal 6.x versions prior to 6.x-1.6
* Memcache for Drupal 5.x versions prior to 5.x-1.10
Drupal core is not affected. If you do not use the contributed Memcache [3]
backend there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Memcache for Drupal 6.x, upgrade to Memcache 6.x-1.6 [4]
* If you use the Memcache for Drupal 5.x, upgrade to Memcache 5.x-2.10 [5]
See also the Memcache project page [6].
-------- REPORTED BY
---------------------------------------------------------
* Justin James Grevich (jgrevich) [7]
* Moshe Weitzman [8], of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Robert Douglass (robertDouglass) [9], module maintainer
* Moshe Weitzman [10], of the Drupal Security Team
-------- CONTACT
-------------------------------------------------------------
The Drupal security team [11] can be reached at security at drupal.org or via
the form at http://drupal.org/contact [12].
[1] http://drupal.org/project/memcache
[2] http://en.wikipedia.org/wiki/Cross-site_scripting
[3] http://drupal.org/project/memcache
[4] http://drupal.org/node/926474
[5] http://drupal.org/node/926478
[6] http://drupal.org/project/memcache
[7] http://drupal.org/user/355156
[8] http://drupal.org/user/31977
[9] http://drupal.org/user/5449
[10] http://drupal.org/user/23
[11] http://drupal.org/security-team
[12] http://drupal.org/contact
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
http://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecurityNotifies] [Security-news] SA-CONTRIB-2010-098 - Memcache - Multiple vulnerabilities, security-news, 30.09.2010
Archiv bereitgestellt durch MHonArc 2.6.19.