[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[SECURITY] Fedora 11 Update: drupal-6.15-1.fc11



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-13364
2009-12-18 03:19:08
--------------------------------------------------------------------------------

Name        : drupal
Product     : Fedora 11
Version     : 6.15
Release     : 1.fc11
URL         : http://www.drupal.org
Summary     : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites.  Drupal is highly
configurable, skinnable, and secure.

--------------------------------------------------------------------------------
Update Information:

  * Advisory ID: DRUPAL-SA-CORE-2009-009    * Project: Drupal core    * Version:
5.x, 6.x    * Date: 2009-December-16    * Security risk: Not critical    *
Exploitable from: Remote    * Vulnerability: Cross site scripting    --------
DESCRIPTION    ---------------------------------------------------------
Multiple vulnerabilities were discovered in Drupal.  .... Contact category name
cross-site scripting    The Contact module does not correctly handle certain
user input when  displaying category information. Users privileged to create
contact  categories can insert arbitrary HTML and script code into the contact
module  administration page. Such a cross-site scripting attack may lead to the
malicious user gaining administrative access. Wikipedia has more information
about cross-site scripting [1] (XSS). This issue affects Drupal 6.x and  Drupal
5.x.  .... Menu description cross-site scripting    The Menu module does not
correctly handle certain user input when displaying  the menu administration
overview. Users privileged to create new menus can  insert arbitrary HTML and
script code into the menu module administration  page. Such a cross-site
scripting attack may lead to the malicious user  gaining administrative access.
Wikipedia has more information about  cross-site scripting [2] (XSS). This issue
affects Drupal 6.x only.  -------- VERSIONS AFFECTED
---------------------------------------------------      * Drupal 5.x before
version 5.21.    * Drupal 6.x before version 6.15.    -------- SOLUTION
------------------------------------------------------------    Install the
latest version:    * If you are running Drupal 6.x then upgrade to Drupal 6.15
[3].    * If you are running Drupal 5.x then upgrade to Drupal 5.21 [4].    If
you are unable to upgrade immediately, you can apply a patch to secure  your
installation until you are able to do a proper upgrade. Theses patches  fix the
security vulnerability, but do not contain other fixes which were  released in
Drupal 5.21 or Drupal 6.15.    * To patch Drupal 6.14 use SA-
CORE-2009-009-6.14.patch [5].    * To patch Drupal 5.20 use SA-
CORE-2009-009-5.20.patch [6].    -------- REPORTED BY
---------------------------------------------------------    The contact
category XSS issue was independently reported by mr.baileys and  Justin Klein
Keane [7]. The menu description XSS issue was reported by  mr.baileys [8].
-------- FIXED BY
------------------------------------------------------------    The contact
category XSS issue was fixed by Justin Klein Keane [9] and Dave  Reid [10]. The
menu description XSS issue was fixed by Gábor Hojtsy [11] and  Heine Deelstra
[12].  -------- CONTACT
-------------------------------------------------------------    The security
team for Drupal can be reached at security at drupal.org or via  the form at
http://drupal.org/contact.    [1] http://en.wikipedia.org/wiki/Cross-
site_scripting  [2] http://en.wikipedia.org/wiki/Cross-site_scripting  [3]
http://ftp.drupal.org/files/projects/drupal-6.15.tar.gz  [4]
http://ftp.drupal.org/files/projects/drupal-5.21.tar.gz  [5]
http://drupal.org/files/sa-core-2009-009/SA-CORE-2009-009-6.14.patch  [6]
http://drupal.org/files/sa-core-2009-009/SA-CORE-2009-009-5.20.patch  [7]
http://drupal.org/user/302225  [8] http://drupal.org/user/383424  [9]
http://drupal.org/user/302225  [10] http://drupal.org/user/53892  [11]
http://drupal.org/user/4166  [12] http://drupal.org/user/17943
_______________________________________________  Security-news mailing list
Security-news drupal org  http://lists.drupal.org/mailman/listinfo/security-news
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 17 2009 Jon Ciesla <limb jcomserv net> - 6.15-1
- Update to 6.15, SA-CORE-2009-009.
* Wed Sep 16 2009 Jon Ciesla <limb jcomserv net> - 6.14-1
- Update to 6.14, SA-CORE-2009-008.
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng lists fedoraproject org> - 6.13-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
* Thu Jul  2 2009 Jon Ciesla <limb jcomserv net> - 6.13-1
- Update to 6.11, SA-CORE-2009-007.
- Added clarifying text on module installation to readme, BZ 500707.
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update drupal' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]