Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] SA-CONTRIB-2014-074 - Storage API - Code execution prevention

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] SA-CONTRIB-2014-074 - Storage API - Code execution prevention


Chronologisch Thread 
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] SA-CONTRIB-2014-074 - Storage API - Code execution prevention
  • Date: Wed, 30 Jul 2014 19:45:20 +0000 (UTC)
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>

View online: https://www.drupal.org/node/2312769

* Advisory ID: DRUPAL-SA-CONTRIB-2014-074
* Project:
(third-party module)
* Version: 7.x
* Date: 2014-July-30
* Security risk: (Less Critical) [1]
* Vulnerability: Arbitrary PHP code execution

-------- DESCRIPTION
---------------------------------------------------------

Storage API is a low-level framework for managed file storage and serving.

The module creates an .htaccess file in the files directory to prevent code
execution, but copied the Drupal core file and wasn't updated to include the
improved file contents after SA-CORE-2013-003 [2].

This vulnerability is mitigated by the fact that it only relates to a defense
in depth mechanism, and sites would only be vulnerable if they are hosted on
a server which contains code that does not use protections similar to those
found in Drupal's file API to manage uploads in a safe manner.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

Drupal core is not affected. If you do not use the contributed
module,
there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

* If you use the Storage API module for Drupal 7.x, upgrade to Storage API
7.x-1.6 [4]

Also see the
project page.

-------- REPORTED BY
---------------------------------------------------------

Reported publicly outside the Drupal Security Team reporting process [5].

-------- FIXED BY
------------------------------------------------------------

* Jonathan Brown [6] and Brady Owens [7] the module maintainers

-------- COORDINATED BY
------------------------------------------------------

* Klaus Purer [8] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [9].

Learn more about the Drupal Security team and their policies [10], writing
secure code for Drupal [11], and securing your site [12].


[1] http://drupal.org/security-team/risk-levels
[2] https://www.drupal.org/SA-CORE-2013-003
[3] http://cve.mitre.org/
[4] https://www.drupal.org/node/2312655
[5] https://www.drupal.org/node/101494
[6] http://drupal.org/user/46104
[7] https://www.drupal.org/user/1547200
[8] https://www.drupal.org/user/262198
[9] http://drupal.org/contact
[10] http://drupal.org/security-team
[11] http://drupal.org/writing-secure-code
[12] http://drupal.org/security/secure-configuration

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news



  • [IT-SecNots] [Security-news] SA-CONTRIB-2014-074 - Storage API - Code execution prevention, security-news, 30.07.2014

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang