[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.4] drupal7: Multiple Vulnerabilities (no CVE)

ID: oval:org.secpod.oval:def:1800811Date: (C)2018-03-29   (M)2021-11-09
Class: PATCHFamily: unix




CVE ID: not yet available File upload access bypass and denial of service . A vulnerability exists in the File module that allows a malicious user to view, delete or substitute a link to a file that the victim has uploaded to a form while the form has not yet been submitted and processed.If an attacker carries out this attack continuously, all file uploads to a site could be blocked by deleting all temporary files before they can be saved. Brute force amplification attacks via XML-RPC . The XML-RPC system allows a large number of calls to the same method to be made at once, which can be used as an enabling factor in brute force attacks . This vulnerability is mitigated by the fact that you must have enabled a module that provides an XML-RPC method that is vulnerable to brute-forcing. There are no such modules in Drupal 7 core, but Drupal 6 core is vulnerable via the Blog API module. It is additionally mitigated if flood control protection is in place for the method in question. Open redirect via path manipulation . In Drupal 6 and 7, the current path can be populated with an external URL. This can lead to Open Redirect vulnerabilities. Reflected file download vulnerability . Drupal core has a reflected file download vulnerability that could allow an attacker to trick a user into downloading and running a file with arbitrary JSON-encoded content. Saving user accounts can sometimes grant the user all roles . Some specific contributed or custom code may call Drupal"s user_save API in a manner different than Drupal core.Depending on the data that has been added to a form or the array prior to saving, this can lead to a user gaining all roles on a site. Email address can be matched to an account . In certain configurations where a user"s email addresses could be used to log in instead of their username,links to "have you forgotten your password" could reveal the username associated with a particular email address,leading to an information disclosure vulnerability. Affected versions: Drupal core 6.x versions prior to 6.38Drupal core 7.x versions prior to 7.43Drupal core 8.0.x versions prior to 8.0.4 Solution: Install the latest version: If you use Drupal 6.x, upgrade to Drupal core 6.38If you use Drupal 7.x, upgrade to Drupal core 7.43If you use Drupal 8.0.x, upgrade to Drupal core 8.0.4

Platform:
Alpine Linux 3.4
Product:
drupal7
Reference:
5238
CPE    2
cpe:/a:apache:subversion
cpe:/o:alpinelinux:alpine_linux:3.4

© SecPod Technologies