Обновляемся до 5.10 и 6.4
Собираемся с духом и обновляемся до 5.10 и 6.4!
- Номер сообщения об уязвимости: DRUPAL-SA-2008-047
- Проект: ядро Друпал
- Версии: 5.x, 6.x
- Дата: 13 июля 2008
- Риск безопасности: Очень опасно
- Тип уязвимости: удалённая
- Уязвимости: множественные уязвимости
Описание
Множественные уязвимости обнаружены в Друпал.
CROSS SITE SCRIPTING
A bug in the output filter employed by Drupal makes it possible for malicious
users to insert script code into pages (cross site scripting [
http://en.wikipedia.org/wiki/Cross-site_scripting ] or XSS).
A bug in the private filesystem trusts the MIME type sent by the browser,
enabling malicious users with the ability to upload files to execute cross site
scripting attacks.
These bugs affects both Drupal 5.x and 6.x.
ARBITRARY FILE UPLOADS VIA BLOGAPI
The BlogAPI module does not validate the extension of uploaded files, enabling
users with the "administer content with blog api" permission to upload harmful
files.
This bug affects both Drupal 5.x and 6.x.
CROSS SITE REQUEST FORGERIES
Drupal forms contain a token to protect against cross site request forgeries [
http://en.wikipedia.org/wiki/Cross-site_request_forgery ] (CSRF). The token may
not be validated properly for cached forms and forms containing AHAH elements.
This bug affects Drupal 6.x.
User access rules can be added or deleted upon accessing a properly formatted