Lucene search

K
debianDebianDEBIAN:DSA-3897-1:BAC5F
HistoryJun 24, 2017 - 5:31 a.m.

[SECURITY] [DSA 3897-1] drupal7 security update

2017-06-2405:31:02
lists.debian.org
6

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

80.5%


Debian Security Advisory DSA-3897-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
June 24, 2017 https://www.debian.org/security/faq


Package : drupal7
CVE ID : CVE-2015-7943 CVE-2017-6922
Debian Bug : 865498

Two vulnerabilities were discovered in Drupal, a fully-featured content
management framework. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2015-7943

Samuel Mortenson and Pere Orga discovered that the overlay module
does not sufficiently validate URLs prior to displaying their
contents, leading to an open redirect vulnerability.

More information can be found at
https://www.drupal.org/SA-CORE-2015-004

CVE-2017-6922

Greg Knaddison, Mori Sugimoto and iancawthorne discovered that files
uploaded by anonymous users into a private file system can be
accessed by other anonymous users leading to an access bypass
vulnerability.

More information can be found at
https://www.drupal.org/SA-CORE-2017-003

For the oldstable distribution (jessie), these problems have been fixed
in version 7.32-1+deb8u9.

For the stable distribution (stretch), these problems have been fixed in
version 7.52-2+deb9u1. For the stable distribution (stretch),
CVE-2015-7943 was already fixed before the initial release.

We recommend that you upgrade your drupal7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

80.5%