it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] SA-CONTRIB-2011-022 - Cosign - SQL Injection
- Date: Wed, 8 Jun 2011 21:22:52 +0000 (UTC)
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
* Advisory ID: DRUPAL-SA-CONTRIB-2011-022
* Project: cosign [1] (third-party module)
* Version: 6.x
* Date: 2011-MONTH-XX
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: SQL Injection
-------- DESCRIPTION
---------------------------------------------------------
Under certain conditions the module deletes uid 1 and then does an
unparameterized db_query to insert a new uid 1.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer site configuration" and must be able to
remotely manipulate the web server environmental variables REMOTE_USER and
REMOTE_REALM.
-------- VERSIONS AFFECTED
---------------------------------------------------
* 6.x-1.4
* 6.x-1.5
* 6.x-1.6
Drupal core is not affected. If you do not use the contributed cosign [3]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Cosign module for Drupal 6.x, upgrade to version 6.x-1.7.
See also the cosign [4] project page.
-------- REPORTED BY
---------------------------------------------------------
* Steven Merrill [5]
-------- FIXED BY
------------------------------------------------------------
* Kris Steinhoff [6] the module maintainer
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [7].
Learn more about the Drupal Security team and their policies [8], writing
secure code for Drupal [9], and securing your site [10].
[1] http://drupal.org/project/cosign
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/project/cosign
[4] http://drupal.org/project/cosign
[5] http://drupal.org/user/218671
[6] http://drupal.org/user/388809/
[7] http://drupal.org/contact
[8] http://drupal.org/security-team
[9] http://drupal.org/writing-secure-code
[10] http://drupal.org/security/secure-configuration
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
http://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] SA-CONTRIB-2011-022 - Cosign - SQL Injection, security-news, 08.06.2011
Archiv bereitgestellt durch MHonArc 2.6.19.