it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2016-005
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2016-005
- Date: Wed, 16 Nov 2016 19:14:38 +0000 (UTC)
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/SA-CORE-2016-005
* Advisory ID: DRUPAL-SA-CORE-2016-005
* Project: Drupal core [1]
* Version: 7.x, 8.x
* Date: 2016-November-16
* Security risk: 13/25 ( Moderately Critical)
AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Uncommon [2]
* Vulnerability: Multiple vulnerabilities
-------- DESCRIPTION
---------------------------------------------------------
.... Inconsistent name for term access query (Less critical - Drupal 7 and
Drupal 8)
Drupal provides a mechanism to alter database SELECT queries before they are
executed. Contributed and custom modules may use this mechanism to restrict
access to certain entities by implementing hook_query_alter() or
hook_query_TAG_alter() in order to add additional conditions. Queries can be
distinguished by means of query tags. As the documentation on
EntityFieldQuery::addTag() [3] suggests, access-tags on entity queries
normally follow the form ENTITY_TYPE_access (e.g. node_access). However, the
taxonomy module's access query tag predated this system and used term_access
as the query tag instead of taxonomy_term_access.
As a result, before this security release modules wishing to restrict access
to taxonomy terms may have implemented an unsupported tag, or needed to look
for both tags (term_access and taxonomy_term_access) in order to be
compatible with queries generated both by Drupal core as well as those
generated by contributed modules like Entity Reference. Otherwise information
on taxonomy terms might have been disclosed to unprivileged users.
.... Incorrect cache context on password reset page (Less critical - Drupal
8)
The user password reset form does not specify a proper cache context, which
can lead to cache poisoning and unwanted content on the page.
.... Confirmation forms allow external URLs to be injected (Moderately
critical - Drupal 7)
Under certain circumstances, malicious users could construct a URL to a
confirmation form that would trick users into being redirected to a 3rd party
website after interacting with the form, thereby exposing the users to
potential social engineering attacks.
.... Denial of service via transliterate mechanism (Moderately critical -
Drupal 8)
A specially crafted URL can cause a denial of service via the transliterate
mechanism.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [4] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Drupal core 7.x versions prior to 7.52
* Drupal core 8.x versions prior to 8.2.3
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Drupal 7.x, upgrade to Drupal core 7.52 [5]
* If you use Drupal 8.x, upgrade to Drupal core 8.2.3 [6]
Also see the Drupal core [7] project page.
-------- REPORTED BY
---------------------------------------------------------
Inconsistent name for term access query:
* znerol [8]
Incorrect cache context on password reset page:
* Charlotte Bone [9]
Confirmation forms allow external URLs to be injected:
* jnicola [10]
* Ezra Wolfe [11]
Denial of service via transliterate mechanism:
* Lee Rowlands [12] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
Inconsistent name for term access query:
* znerol [13]
* xjm [14] of the Drupal Security Team
* David Rothstein [15] of the Drupal Security Team
* Dave Reid [16] of the Drupal Security Team
* Larry Garfield [17]
Incorrect cache context on password reset page:
* Chris McCafferty [18], provisional Drupal Security Team member
* xjm [19] of the Drupal Security Team
* Alex Pott [20] of the Drupal Security Team
* Michael Hess [21] of the Drupal Security Team
* Nathaniel Catchpole [22] of the Drupal Security Team
Confirmation forms allow external URLs to be injected:
* Peter Wolanin [23] of the Drupal Security Team
* Alex Pott [24] of the Drupal Security Team
* David Rothstein [25] of the Drupal Security Team
Denial of service via transliterate mechanism:
* Lee Rowlands [26] of the Drupal Security Team
* Cathy Theys [27] of the Drupal Security Team
* Alex Pott [28] of the Drupal Security Team
* Peter Wolanin [29] of the Drupal Security Team
* Daniel Wehner [30]
* Nate Haug [31]
* Heine Deelstra [32] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [33].
Learn more about the Drupal Security team and their policies [34], writing
secure code for Drupal [35], and securing your site [36].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [37]
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3]
https://api.drupal.org/api/drupal/includes!entity.inc/function/EntityFieldQuery%3A%3AaddTag/7.x
[4] http://cve.mitre.org/
[5] https://www.drupal.org/project/drupal/releases/7.52
[6] https://www.drupal.org/project/drupal/releases/8.2.3
[7] https://www.drupal.org/project/drupal
[8] https://www.drupal.org/user/63999
[9] https://www.drupal.org/u/charlotteb
[10] https://www.drupal.org/u/jnicola
[11] https://www.drupal.org/u/ezraw
[12] https://www.drupal.org/u/larowlan
[13] https://www.drupal.org/user/63999
[14] https://www.drupal.org/user/65776
[15] https://www.drupal.org/u/David_Rothstein
[16] https://www.drupal.org/u/dave-reid
[17] https://www.drupal.org/u/Crell
[18] https://www.drupal.org/u/cilefen
[19] https://www.drupal.org/user/65776
[20] https://www.drupal.org/user/157725
[21] https://www.drupal.org/u/mlhess
[22] https://www.drupal.org/u/catch
[23] https://www.drupal.org/u/pwolanin
[24] https://www.drupal.org/user/157725
[25] https://www.drupal.org/u/David_Rothstein
[26] https://www.drupal.org/u/larowlan
[27] https://www.drupal.org/u/yesct
[28] https://www.drupal.org/user/157725
[29] https://www.drupal.org/u/pwolanin
[30] https://www.drupal.org/u/dawehner
[31] https://www.drupal.org/u/quicksketch
[32] https://www.drupal.org/u/Heine
[33] https://www.drupal.org/contact
[34] https://www.drupal.org/security-team
[35] https://www.drupal.org/writing-secure-code
[36] https://www.drupal.org/security/secure-configuration
[37] https://twitter.com/drupalsecurity
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2016-005, security-news, 16.11.2016
Archiv bereitgestellt durch MHonArc 2.6.19.