ID FREEBSD_PKG_4FC2DF49627911E7BE0F6CF0497DB129.NASL Type nessus Reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2019-11-02T00:00:00
Description
Drupal Security Team Reports :
CVE-2017-6920: PECL YAML parser unsafe object handling.
CVE-2017-6921: File REST resource does not properly validate
CVE-2017-6922: Files uploaded by anonymous users into a private file
system can be accessed by other anonymous users.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the FreeBSD VuXML database :
#
# Copyright 2003-2018 Jacques Vidrine and contributors
#
# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
# HTML, PDF, PostScript, RTF and so forth) with or without modification,
# are permitted provided that the following conditions are met:
# 1. Redistributions of source code (VuXML) must retain the above
# copyright notice, this list of conditions and the following
# disclaimer as the first lines of this file unmodified.
# 2. Redistributions in compiled form (transformed to other DTDs,
# published online in any format, converted to PDF, PostScript,
# RTF and other formats) must reproduce the above copyright
# notice, this list of conditions and the following disclaimer
# in the documentation and/or other materials provided with the
# distribution.
#
# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
include("compat.inc");
if (description)
{
script_id(101276);
script_version("3.5");
script_cvs_date("Date: 2018/11/10 11:49:46");
script_cve_id("CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922");
script_name(english:"FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)");
script_summary(english:"Checks for updated packages in pkg_info output");
script_set_attribute(
attribute:"synopsis",
value:
"The remote FreeBSD host is missing one or more security-related
updates."
);
script_set_attribute(
attribute:"description",
value:
"Drupal Security Team Reports :
CVE-2017-6920: PECL YAML parser unsafe object handling.
CVE-2017-6921: File REST resource does not properly validate
CVE-2017-6922: Files uploaded by anonymous users into a private file
system can be accessed by other anonymous users."
);
# https://vuxml.freebsd.org/freebsd/4fc2df49-6279-11e7-be0f-6cf0497db129.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?d5d19c09"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:drupal7");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:drupal8");
script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/21");
script_set_attribute(attribute:"patch_publication_date", value:"2017/07/06");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/07");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"FreeBSD Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
exit(0);
}
include("audit.inc");
include("freebsd_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (pkg_test(save_report:TRUE, pkg:"drupal7<7.56")) flag++;
if (pkg_test(save_report:TRUE, pkg:"drupal8<8.3.4")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "FREEBSD_PKG_4FC2DF49627911E7BE0F6CF0497DB129.NASL", "bulletinFamily": "scanner", "title": "FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)", "description": "Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.", "published": "2017-07-07T00:00:00", "modified": "2019-11-02T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/101276", "reporter": "This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?d5d19c09"], "cvelist": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"], "type": "nessus", "lastseen": "2019-11-01T02:37:45", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:drupal8", "p-cpe:/a:freebsd:freebsd:drupal7"], "cvelist": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file system can be accessed by other anonymous users.", "edition": 6, "enchantments": {"score": {"value": 5.0, "vector": "NONE"}}, "hash": "2708774e2eb79e92e47e4dfda128bc5400ec48fcb8f57994f55d5fbbb80d4907", "hashmap": [{"hash": "58fc5909673a99968a5afbc8661ec060", "key": "cvelist"}, {"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "933a78f44df18ec748c1b4a59010bf8e", "key": "references"}, {"hash": "b8720b4523966cfe6590bedd2d3b4b54", "key": "title"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "63587db300cf444e7fae481f658ee30d", "key": "sourceData"}, {"hash": "9de0a66ebe77eba7a2f6cfe810732ea0", "key": "href"}, {"hash": "90220e1118d912ebae78e544f8e31881", "key": "description"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "33d89fc8036344e04e16cc3ec7440567", "key": "cpe"}, {"hash": "d89cc672a6266551218ef8145d1f22e2", "key": "published"}, {"hash": "e94334e884038f4c5336d7b43deee6eb", "key": "pluginID"}, {"hash": "2128932940bc828474a62d4220bbd26a", "key": "modified"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=101276", "id": "FREEBSD_PKG_4FC2DF49627911E7BE0F6CF0497DB129.NASL", "lastseen": "2018-10-06T00:50:45", "modified": "2018-10-05T00:00:00", "naslFamily": "FreeBSD Local Security Checks", "objectVersion": "1.3", "pluginID": "101276", "published": "2017-07-07T00:00:00", "references": ["http://www.nessus.org/u?d1948000"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101276);\n script_version(\"3.4\");\n script_cvs_date(\"Date: 2018/10/05 10:43:24\");\n\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n\n script_name(english:\"FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.\"\n );\n # http://www.freebsd.org/ports/portaudit/4fc2df49-6279-11e7-be0f-6cf0497db129.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d1948000\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"drupal7<7.56\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"drupal8<8.3.4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)", "type": "nessus", "viewCount": 4}, "differentElements": ["references", "modified", "sourceData"], "edition": 6, "lastseen": "2018-10-06T00:50:45"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:drupal8", "p-cpe:/a:freebsd:freebsd:drupal7"], "cvelist": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.", "edition": 8, "enchantments": {"dependencies": {"modified": "2019-01-16T20:27:52", "references": [{"idList": ["FEDORA_2017-38113758E7.NASL", "FEDORA_2017-6874606E19.NASL", "DEBIAN_DSA-3897.NASL", "FEDORA_2017-E8A2017B3C.NASL", "DRUPAL_8_3_4.NASL", "DEBIAN_DLA-1004.NASL"], "type": "nessus"}, {"idList": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"], "type": "cve"}, {"idList": ["OPENVAS:1361412562310703897", "OPENVAS:1361412562310891004", "OPENVAS:1361412562310810960", "OPENVAS:1361412562310872827", "OPENVAS:1361412562310874428", "OPENVAS:1361412562310874383", "OPENVAS:1361412562310810959", "OPENVAS:1361412562310872834", "OPENVAS:703897"], "type": "openvas"}, {"idList": ["4FC2DF49-6279-11E7-BE0F-6CF0497DB129"], "type": "freebsd"}, {"idList": ["DEBIAN:DLA-1004-1:9EDA0", "DEBIAN:DSA-3897-1:BAC5F"], "type": "debian"}]}, "score": {"value": 5.0, "vector": "NONE"}}, "hash": "0d087e7d4b57950ce60f14b1bceaffd029599183389b81a64c999aaaeb76f2e7", "hashmap": [{"hash": "58fc5909673a99968a5afbc8661ec060", "key": "cvelist"}, {"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "b8720b4523966cfe6590bedd2d3b4b54", "key": "title"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "ca5d96afac04a5cd0fbb4492693344c8", "key": "references"}, {"hash": "9de0a66ebe77eba7a2f6cfe810732ea0", "key": "href"}, {"hash": "faf030222734685373551b9a8a07876e", "key": "description"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "3c764d4cf584f9ded7aa4dcca57c78ff", "key": "modified"}, {"hash": "33d89fc8036344e04e16cc3ec7440567", "key": "cpe"}, {"hash": "202d0e272097761803cd925321ee61f8", "key": "sourceData"}, {"hash": "d89cc672a6266551218ef8145d1f22e2", "key": "published"}, {"hash": "e94334e884038f4c5336d7b43deee6eb", "key": "pluginID"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=101276", "id": "FREEBSD_PKG_4FC2DF49627911E7BE0F6CF0497DB129.NASL", "lastseen": "2019-01-16T20:27:52", "modified": "2018-11-10T00:00:00", "naslFamily": "FreeBSD Local Security Checks", "objectVersion": "1.3", "pluginID": "101276", "published": "2017-07-07T00:00:00", "references": ["http://www.nessus.org/u?d5d19c09"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101276);\n script_version(\"3.5\");\n script_cvs_date(\"Date: 2018/11/10 11:49:46\");\n\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n\n script_name(english:\"FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.\"\n );\n # https://vuxml.freebsd.org/freebsd/4fc2df49-6279-11e7-be0f-6cf0497db129.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d5d19c09\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"drupal7<7.56\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"drupal8<8.3.4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)", "type": "nessus", "viewCount": 4}, "differentElements": ["description"], "edition": 8, "lastseen": "2019-01-16T20:27:52"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file system can be accessed by other anonymous users.", "edition": 1, "enchantments": {}, "hash": "0e5d7d9044c2dcaca729ccbd557f50fef04bf8fa4f96398d8d43278c58a5dc2f", "hashmap": [{"hash": "58fc5909673a99968a5afbc8661ec060", "key": "cvelist"}, {"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "933a78f44df18ec748c1b4a59010bf8e", "key": "references"}, {"hash": "b8720b4523966cfe6590bedd2d3b4b54", "key": "title"}, {"hash": "71a5db2d0ac2a1b701c77c026399a20b", "key": "sourceData"}, {"hash": "9de0a66ebe77eba7a2f6cfe810732ea0", "key": "href"}, {"hash": "90220e1118d912ebae78e544f8e31881", "key": "description"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "d89cc672a6266551218ef8145d1f22e2", "key": "modified"}, {"hash": "d89cc672a6266551218ef8145d1f22e2", "key": "published"}, {"hash": "e94334e884038f4c5336d7b43deee6eb", "key": "pluginID"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=101276", "id": "FREEBSD_PKG_4FC2DF49627911E7BE0F6CF0497DB129.NASL", "lastseen": "2017-07-07T22:26:27", "modified": "2017-07-07T00:00:00", "naslFamily": "FreeBSD Local Security Checks", "objectVersion": "1.3", "pluginID": "101276", "published": "2017-07-07T00:00:00", "references": ["http://www.nessus.org/u?d1948000"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2017 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101276);\n script_version(\"$Revision: 3.1 $\");\n script_cvs_date(\"$Date: 2017/07/07 13:22:57 $\");\n\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n\n script_name(english:\"FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.\"\n );\n # http://www.freebsd.org/ports/portaudit/4fc2df49-6279-11e7-be0f-6cf0497db129.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d1948000\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017 Tenable Network Security, Inc.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"drupal7<7.56\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"drupal8<8.3.4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)", "type": "nessus", "viewCount": 0}, "differentElements": ["modified", "sourceData"], "edition": 1, "lastseen": "2017-07-07T22:26:27"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:drupal8", "p-cpe:/a:freebsd:freebsd:drupal7"], "cvelist": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"], "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "description": "Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.", "edition": 10, "enchantments": {"dependencies": {"modified": "2019-10-28T20:21:23", "references": [{"idList": ["FEDORA_2017-38113758E7.NASL", "FEDORA_2017-6874606E19.NASL", "DEBIAN_DSA-3897.NASL", "FEDORA_2017-E8A2017B3C.NASL", "DRUPAL_8_3_4.NASL", "DEBIAN_DLA-1004.NASL"], "type": "nessus"}, {"idList": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"], "type": "cve"}, {"idList": ["OPENVAS:1361412562310703897", "OPENVAS:1361412562310891004", "OPENVAS:1361412562310810960", "OPENVAS:1361412562310872827", "OPENVAS:1361412562310874428", "OPENVAS:1361412562310874383", "OPENVAS:1361412562310810959", "OPENVAS:1361412562310872834", "OPENVAS:703897"], "type": "openvas"}, {"idList": ["4FC2DF49-6279-11E7-BE0F-6CF0497DB129"], "type": "freebsd"}, {"idList": ["DEBIAN:DLA-1004-1:9EDA0", "DEBIAN:DSA-3897-1:BAC5F"], "type": "debian"}]}, "score": {"modified": "2019-10-28T20:21:23", "value": 5.6, "vector": "NONE"}}, "hash": "18b5c6b31f7278916a50c971c7c51a8a380b0000098a064ca8866ebbd69a245f", "hashmap": [{"hash": "58fc5909673a99968a5afbc8661ec060", "key": "cvelist"}, {"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "b8720b4523966cfe6590bedd2d3b4b54", "key": "title"}, {"hash": "0e28ab6de16f7e34659e91d95aa5e014", "key": "reporter"}, {"hash": "ca5d96afac04a5cd0fbb4492693344c8", "key": "references"}, {"hash": "054c16b82d6f8eaf8abd66b1b44422b7", "key": "href"}, {"hash": "faf030222734685373551b9a8a07876e", "key": "description"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "33d89fc8036344e04e16cc3ec7440567", "key": "cpe"}, {"hash": "0b053db5674b87efff89989a8a720df3", "key": "cvss"}, {"hash": "202d0e272097761803cd925321ee61f8", "key": "sourceData"}, {"hash": "d89cc672a6266551218ef8145d1f22e2", "key": "published"}, {"hash": "e94334e884038f4c5336d7b43deee6eb", "key": "pluginID"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/101276", "id": "FREEBSD_PKG_4FC2DF49627911E7BE0F6CF0497DB129.NASL", "lastseen": "2019-10-28T20:21:23", "modified": "2019-10-02T00:00:00", "naslFamily": "FreeBSD Local Security Checks", "objectVersion": "1.3", "pluginID": "101276", "published": "2017-07-07T00:00:00", "references": ["http://www.nessus.org/u?d5d19c09"], "reporter": "This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101276);\n script_version(\"3.5\");\n script_cvs_date(\"Date: 2018/11/10 11:49:46\");\n\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n\n script_name(english:\"FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.\"\n );\n # https://vuxml.freebsd.org/freebsd/4fc2df49-6279-11e7-be0f-6cf0497db129.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d5d19c09\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"drupal7<7.56\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"drupal8<8.3.4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)", "type": "nessus", "viewCount": 4}, "differentElements": ["modified"], "edition": 10, "lastseen": "2019-10-28T20:21:23"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file system can be accessed by other anonymous users.", "edition": 2, "enchantments": {}, "hash": "1cb3c0ed9e550ac0a1aa31d2f06e74a06bab058133c61a55b7e04f245b6f4d3d", "hashmap": [{"hash": "58fc5909673a99968a5afbc8661ec060", "key": "cvelist"}, {"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "933a78f44df18ec748c1b4a59010bf8e", "key": "references"}, {"hash": "b8720b4523966cfe6590bedd2d3b4b54", "key": "title"}, {"hash": "9de0a66ebe77eba7a2f6cfe810732ea0", "key": "href"}, {"hash": "90220e1118d912ebae78e544f8e31881", "key": "description"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "dec1362fed222124d4c9f01a33560b8d", "key": "sourceData"}, {"hash": "0d134bf170d66438eb1e01173ee0187f", "key": "modified"}, {"hash": "d89cc672a6266551218ef8145d1f22e2", "key": "published"}, {"hash": "e94334e884038f4c5336d7b43deee6eb", "key": "pluginID"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=101276", "id": "FREEBSD_PKG_4FC2DF49627911E7BE0F6CF0497DB129.NASL", "lastseen": "2017-07-10T23:49:14", "modified": "2017-07-10T00:00:00", "naslFamily": "FreeBSD Local Security Checks", "objectVersion": "1.3", "pluginID": "101276", "published": "2017-07-07T00:00:00", "references": ["http://www.nessus.org/u?d1948000"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2017 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101276);\n script_version(\"$Revision: 3.2 $\");\n script_cvs_date(\"$Date: 2017/07/10 15:42:50 $\");\n\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n script_xref(name:\"IAVA\", value:\"2017-A-0185\");\n\n script_name(english:\"FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.\"\n );\n # http://www.freebsd.org/ports/portaudit/4fc2df49-6279-11e7-be0f-6cf0497db129.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d1948000\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/07\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017 Tenable Network Security, Inc.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"drupal7<7.56\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"drupal8<8.3.4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)", "type": "nessus", "viewCount": 1}, "differentElements": ["modified", "sourceData"], "edition": 2, "lastseen": "2017-07-10T23:49:14"}], "edition": 11, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "33d89fc8036344e04e16cc3ec7440567"}, {"key": "cvelist", "hash": "58fc5909673a99968a5afbc8661ec060"}, {"key": "cvss", "hash": "0b053db5674b87efff89989a8a720df3"}, {"key": "description", "hash": "faf030222734685373551b9a8a07876e"}, {"key": "href", "hash": "054c16b82d6f8eaf8abd66b1b44422b7"}, {"key": "modified", "hash": "abcf9266f425f12dda38f529cd4a94bc"}, {"key": "naslFamily", "hash": "fe45aa727b58c1249bf04cfb7b4e6ae0"}, {"key": "pluginID", "hash": "e94334e884038f4c5336d7b43deee6eb"}, {"key": "published", "hash": "d89cc672a6266551218ef8145d1f22e2"}, {"key": "references", "hash": "ca5d96afac04a5cd0fbb4492693344c8"}, {"key": "reporter", "hash": "0e28ab6de16f7e34659e91d95aa5e014"}, {"key": "sourceData", "hash": "202d0e272097761803cd925321ee61f8"}, {"key": "title", "hash": "b8720b4523966cfe6590bedd2d3b4b54"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "2e2b702437d053031f8ae5063307debf6f9ed79793fa9f153b87c6bfabb26873", "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2017-6920", "CVE-2017-6921", "CVE-2017-6922"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310810959", "OPENVAS:1361412562310810960", "OPENVAS:1361412562310891004", "OPENVAS:1361412562310872834", "OPENVAS:1361412562310872827", "OPENVAS:703897", "OPENVAS:1361412562310703897", "OPENVAS:1361412562310874383", "OPENVAS:1361412562310874428"]}, {"type": "nessus", "idList": ["DRUPAL_8_3_4.NASL", "DEBIAN_DLA-1004.NASL", "FEDORA_2017-6874606E19.NASL", "FEDORA_2017-E8A2017B3C.NASL", "FEDORA_2017-38113758E7.NASL", "DEBIAN_DSA-3897.NASL"]}, {"type": "freebsd", "idList": ["4FC2DF49-6279-11E7-BE0F-6CF0497DB129"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1004-1:9EDA0", "DEBIAN:DSA-3897-1:BAC5F"]}], "modified": "2019-11-01T02:37:45"}, "score": {"value": 5.6, "vector": "NONE", "modified": "2019-11-01T02:37:45"}, "vulnersScore": 5.6}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101276);\n script_version(\"3.5\");\n script_cvs_date(\"Date: 2018/11/10 11:49:46\");\n\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n\n script_name(english:\"FreeBSD : drupal -- Drupal Core - Multiple Vulnerabilities (4fc2df49-6279-11e7-be0f-6cf0497db129)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Drupal Security Team Reports :\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\n\nCVE-2017-6921: File REST resource does not properly validate\n\nCVE-2017-6922: Files uploaded by anonymous users into a private file\nsystem can be accessed by other anonymous users.\"\n );\n # https://vuxml.freebsd.org/freebsd/4fc2df49-6279-11e7-be0f-6cf0497db129.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d5d19c09\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"drupal7<7.56\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"drupal8<8.3.4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "FreeBSD Local Security Checks", "pluginID": "101276", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:drupal8", "p-cpe:/a:freebsd:freebsd:drupal7"], "scheme": null}
{"cve": [{"lastseen": "2019-05-29T18:17:09", "bulletinFamily": "NVD", "description": "Drupal core 8 before versions 8.3.4 allows remote attackers to execute arbitrary code due to the PECL YAML parser not handling PHP objects safely during certain operations.", "modified": "2018-10-04T16:16:00", "id": "CVE-2017-6920", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6920", "published": "2018-08-06T15:29:00", "title": "CVE-2017-6920", "type": "cve", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-10-10T12:22:18", "bulletinFamily": "NVD", "description": "In Drupal 8 prior to 8.3.4; The file REST resource does not properly validate some fields when manipulating files. A site is only affected by this if the site has the RESTful Web Services (rest) module enabled, the file REST resource is enabled and allows PATCH requests, and an attacker can get or register a user account on the site with permissions to upload files and to modify the file resource.", "modified": "2019-10-09T23:29:00", "id": "CVE-2017-6921", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6921", "published": "2019-01-15T21:29:00", "title": "CVE-2017-6921", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-10-10T12:22:18", "bulletinFamily": "NVD", "description": "In Drupal core 8.x prior to 8.3.4 and Drupal core 7.x prior to 7.56; Private files that have been uploaded by an anonymous user but not permanently attached to content on the site should only be visible to the anonymous user that uploaded them, rather than all anonymous users. Drupal core did not previously provide this protection, allowing an access bypass vulnerability to occur. This issue is mitigated by the fact that in order to be affected, the site must allow anonymous users to upload files into a private file system.", "modified": "2019-10-09T23:29:00", "id": "CVE-2017-6922", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6922", "published": "2019-01-22T15:29:00", "title": "CVE-2017-6922", "type": "cve", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:34:39", "bulletinFamily": "scanner", "description": "This host is running Drupal and is prone\n to multiple vulnerabilities.", "modified": "2019-02-19T00:00:00", "published": "2017-06-22T00:00:00", "id": "OPENVAS:1361412562310810959", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810959", "title": "Drupal Core Multiple Vulnerabilities (SA-CORE-2017-003) (Linux)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_drupal_core_mult_vuln_SA-CORE-2017-003_lin.nasl 13750 2019-02-19 07:33:36Z mmartin $\n#\n# Drupal Core Multiple Vulnerabilities (SA-CORE-2017-003) (Linux)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = 'cpe:/a:drupal:drupal';\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810959\");\n script_version(\"$Revision: 13750 $\");\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n script_bugtraq_id(99211, 99222, 99219);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-02-19 08:33:36 +0100 (Tue, 19 Feb 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-22 14:36:14 +0530 (Thu, 22 Jun 2017)\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_name(\"Drupal Core Multiple Vulnerabilities (SA-CORE-2017-003) (Linux)\");\n\n script_tag(name:\"summary\", value:\"This host is running Drupal and is prone\n to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - PECL YAML parser does not handle PHP objects safely during certain\n operations within Drupal core.\n\n - The file REST resource does not properly validate some fields when\n manipulating files.\n\n - Private files that have been uploaded by an anonymous user but not\n permanently attached to content on the site is visible to the anonymous\n user, Drupal core did not provide sufficient protection.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to execute arbitrary code, get or register a user account on the\n site with permissions to upload files into a private file system and\n modify the file resource.\");\n\n script_tag(name:\"affected\", value:\"Drupal core version 7.x versions prior to\n 7.56 and 8.x versions prior to 8.3.4.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Drupal core version 7.56 or\n 8.3.4 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://www.drupal.org/SA-CORE-2017-003\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"drupal_detect.nasl\", \"os_detection.nasl\");\n script_mandatory_keys(\"drupal/installed\", \"Host/runs_unixoide\");\n script_require_ports(\"Services/www\", 80);\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!drupalPort= get_app_port(cpe:CPE)){\n exit(0);\n}\n\nif(!drupalVer = get_app_version(cpe:CPE, port:drupalPort, version_regex:\"^[0-9]\\.[0-9.]+\")){\n exit(0);\n}\n\nif(drupalVer =~ \"^(8\\.)\")\n{\n if(version_is_less(version:drupalVer, test_version:\"8.3.4\")){\n fix = \"8.3.4\";\n }\n}\nelse if(drupalVer =~ \"^(7\\.)\")\n{\n if(version_is_less(version:drupalVer, test_version:\"7.56\")){\n fix = \"7.56\";\n }\n}\n\nif(fix)\n{\n report = report_fixed_ver(installed_version:drupalVer, fixed_version:fix);\n security_message(data:report, port:drupalPort);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:03", "bulletinFamily": "scanner", "description": "This host is running Drupal and is prone\n to multiple vulnerabilities.", "modified": "2019-02-19T00:00:00", "published": "2017-06-22T00:00:00", "id": "OPENVAS:1361412562310810960", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810960", "title": "Drupal Core Multiple Vulnerabilities (SA-CORE-2017-003) (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_drupal_core_mult_vuln_SA-CORE-2017-003_win.nasl 13750 2019-02-19 07:33:36Z mmartin $\n#\n# Drupal Core Multiple Vulnerabilities (SA-CORE-2017-003) (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = 'cpe:/a:drupal:drupal';\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810960\");\n script_version(\"$Revision: 13750 $\");\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n script_bugtraq_id(99211, 99222, 99219);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-02-19 08:33:36 +0100 (Tue, 19 Feb 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-22 14:36:14 +0530 (Thu, 22 Jun 2017)\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_name(\"Drupal Core Multiple Vulnerabilities (SA-CORE-2017-003) (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is running Drupal and is prone\n to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - PECL YAML parser does not handle PHP objects safely during certain\n operations within Drupal core.\n\n - The file REST resource does not properly validate some fields when\n manipulating files.\n\n - Private files that have been uploaded by an anonymous user but not\n permanently attached to content on the site is visible to the anonymous\n user, Drupal core did not provide sufficient protection.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to execute arbitrary code, get or register a user account on the\n site with permissions to upload files into a private file system and\n modify the file resource.\");\n\n script_tag(name:\"affected\", value:\"Drupal core version 7.x versions prior to\n 7.56 and 8.x versions prior to 8.3.4.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Drupal core version 7.56 or\n 8.3.4 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://www.drupal.org/SA-CORE-2017-003\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"drupal_detect.nasl\", \"os_detection.nasl\");\n script_mandatory_keys(\"drupal/installed\", \"Host/runs_windows\");\n script_require_ports(\"Services/www\", 80);\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!drupalPort= get_app_port(cpe:CPE)){\n exit(0);\n}\n\nif(!drupalVer = get_app_version(cpe:CPE, port:drupalPort, version_regex:\"^[0-9]\\.[0-9.]+\")){\n exit(0);\n}\n\nif(drupalVer =~ \"^(8\\.)\")\n{\n if(version_is_less(version:drupalVer, test_version:\"8.3.4\")){\n fix = \"8.3.4\";\n }\n}\nelse if(drupalVer =~ \"^(7\\.)\")\n{\n if(version_is_less(version:drupalVer, test_version:\"7.56\")){\n fix = \"7.56\";\n }\n}\n\nif(fix)\n{\n report = report_fixed_ver(installed_version:drupalVer, fixed_version:fix);\n security_message(data:report, port:drupalPort);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:36", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-07-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872834", "id": "OPENVAS:1361412562310872834", "title": "Fedora Update for drupal7 FEDORA-2017-e8a2017b3c", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for drupal7 FEDORA-2017-e8a2017b3c\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872834\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-07-04 05:22:15 +0200 (Tue, 04 Jul 2017)\");\n script_cve_id(\"CVE-2017-6922\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for drupal7 FEDORA-2017-e8a2017b3c\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'drupal7'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"drupal7 on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-e8a2017b3c\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NFO5MUOZTCYAE3FP5HXFALHYNS7NW3E4\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"drupal7\", rpm:\"drupal7~7.56~1.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:34:31", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-07-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872827", "id": "OPENVAS:1361412562310872827", "title": "Fedora Update for drupal7 FEDORA-2017-38113758e7", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for drupal7 FEDORA-2017-38113758e7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872827\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-07-04 05:22:12 +0200 (Tue, 04 Jul 2017)\");\n script_cve_id(\"CVE-2017-6922\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for drupal7 FEDORA-2017-38113758e7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'drupal7'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"drupal7 on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-38113758e7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CJF5LAK6SPHMAPHON5U5N7PW3IJGZY6\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"drupal7\", rpm:\"drupal7~7.56~1.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:30", "bulletinFamily": "scanner", "description": "Private files that have been uploaded by an anonymous user but not permanently\nattached to content on the site should only be visible to the anonymous user\nthat uploaded them, rather than all anonymous users. Drupal core did not\npreviously provide this protection, allowing an access bypass vulnerability to\noccur. This issue is mitigated by the fact that in order to be affected, the\nsite must allow anonymous users to upload files into a private file system.", "modified": "2019-03-18T00:00:00", "published": "2018-01-29T00:00:00", "id": "OPENVAS:1361412562310891004", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891004", "title": "Debian LTS Advisory ([SECURITY] [DLA 1004-1] drupal7 security update)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: deb_dla_1004.nasl 14281 2019-03-18 14:53:48Z cfischer $\n#\n# Auto-generated from advisory DLA 1004-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891004\");\n script_version(\"$Revision: 14281 $\");\n script_cve_id(\"CVE-2017-6922\");\n script_name(\"Debian LTS Advisory ([SECURITY] [DLA 1004-1] drupal7 security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:53:48 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-29 00:00:00 +0100 (Mon, 29 Jan 2018)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2017/06/msg00034.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n script_tag(name:\"affected\", value:\"drupal7 on Debian Linux\");\n script_tag(name:\"solution\", value:\"For Debian 7 'Wheezy', these problems have been fixed in version\n7.14-2+deb7u16.\n\nWe recommend that you upgrade your drupal7 packages.\");\n script_tag(name:\"summary\", value:\"Private files that have been uploaded by an anonymous user but not permanently\nattached to content on the site should only be visible to the anonymous user\nthat uploaded them, rather than all anonymous users. Drupal core did not\npreviously provide this protection, allowing an access bypass vulnerability to\noccur. This issue is mitigated by the fact that in order to be affected, the\nsite must allow anonymous users to upload files into a private file system.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.14-2+deb7u16\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:34:29", "bulletinFamily": "scanner", "description": "Two vulnerabilities were discovered in Drupal, a fully-featured content\nmanagement framework. The Common Vulnerabilities and Exposures project\nidentifies the following issues:\n\nCVE-2015-7943\nSamuel Mortenson and Pere Orga discovered that the overlay module\ndoes not sufficiently validate URLs prior to displaying their\ncontents, leading to an open redirect vulnerability.\n\nCVE-2017-6922\nGreg Knaddison, Mori Sugimoto and iancawthorne discovered that files\nuploaded by anonymous users into a private file system can be\naccessed by other anonymous users leading to an access bypass\nvulnerability.", "modified": "2019-03-18T00:00:00", "published": "2017-06-24T00:00:00", "id": "OPENVAS:1361412562310703897", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703897", "title": "Debian Security Advisory DSA 3897-1 (drupal7 - security update)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3897.nasl 14280 2019-03-18 14:50:45Z cfischer $\n# Auto-generated from advisory DSA 3897-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703897\");\n script_version(\"$Revision: 14280 $\");\n script_cve_id(\"CVE-2015-7943\", \"CVE-2017-6922\");\n script_name(\"Debian Security Advisory DSA 3897-1 (drupal7 - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:50:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-24 00:00:00 +0200 (Sat, 24 Jun 2017)\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2017/dsa-3897.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(8|9)\");\n script_tag(name:\"affected\", value:\"drupal7 on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (jessie), these problems have been fixed\nin version 7.32-1+deb8u9.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 7.52-2+deb9u1. For the stable distribution (stretch),\nCVE-2015-7943\nwas already fixed before the initial release.\n\nWe recommend that you upgrade your drupal7 packages.\");\n script_tag(name:\"summary\", value:\"Two vulnerabilities were discovered in Drupal, a fully-featured content\nmanagement framework. The Common Vulnerabilities and Exposures project\nidentifies the following issues:\n\nCVE-2015-7943\nSamuel Mortenson and Pere Orga discovered that the overlay module\ndoes not sufficiently validate URLs prior to displaying their\ncontents, leading to an open redirect vulnerability.\n\nCVE-2017-6922\nGreg Knaddison, Mori Sugimoto and iancawthorne discovered that files\nuploaded by anonymous users into a private file system can be\naccessed by other anonymous users leading to an access bypass\nvulnerability.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.32-1+deb8u9\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.52-2+deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2017-11-09T12:57:51", "bulletinFamily": "scanner", "description": "Two vulnerabilities were discovered in Drupal, a fully-featured content\nmanagement framework. The Common Vulnerabilities and Exposures project\nidentifies the following issues:\n\nCVE-2015-7943 \nSamuel Mortenson and Pere Orga discovered that the overlay module\ndoes not sufficiently validate URLs prior to displaying their\ncontents, leading to an open redirect vulnerability.\n\nMore information can be found at\nhttps://www.drupal.org/SA-CORE-2015-004CVE-2017-6922 \nGreg Knaddison, Mori Sugimoto and iancawthorne discovered that files\nuploaded by anonymous users into a private file system can be\naccessed by other anonymous users leading to an access bypass\nvulnerability.\n\nMore information can be found at\nhttps://www.drupal.org/SA-CORE-2017-003", "modified": "2017-07-07T00:00:00", "published": "2017-06-24T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=703897", "id": "OPENVAS:703897", "title": "Debian Security Advisory DSA 3897-1 (drupal7 - security update)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3897.nasl 6607 2017-07-07 12:04:25Z cfischer $\n# Auto-generated from advisory DSA 3897-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703897);\n script_version(\"$Revision: 6607 $\");\n script_cve_id(\"CVE-2015-7943\", \"CVE-2017-6922\");\n script_name(\"Debian Security Advisory DSA 3897-1 (drupal7 - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:04:25 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2017-06-24 00:00:00 +0200 (Sat, 24 Jun 2017)\");\n script_tag(name: \"cvss_base\", value: \"10.0\");\n script_tag(name: \"cvss_base_vector\", value: \"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2017/dsa-3897.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"drupal7 on Debian Linux\");\n script_tag(name: \"insight\", value: \"Drupal is a dynamic web site platform which allows an individual or\ncommunity of users to publish, manage and organize a variety of\ncontent, Drupal integrates many popular features of content\nmanagement systems, weblogs, collaborative tools and discussion-based\ncommunity software into one easy-to-use package.\");\n script_tag(name: \"solution\", value: \"For the oldstable distribution (jessie), these problems have been fixed\nin version 7.32-1+deb8u9.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 7.52-2+deb9u1. For the stable distribution (stretch),\nCVE-2015-7943 \nwas already fixed before the initial release.\n\nWe recommend that you upgrade your drupal7 packages.\");\n script_tag(name: \"summary\", value: \"Two vulnerabilities were discovered in Drupal, a fully-featured content\nmanagement framework. The Common Vulnerabilities and Exposures project\nidentifies the following issues:\n\nCVE-2015-7943 \nSamuel Mortenson and Pere Orga discovered that the overlay module\ndoes not sufficiently validate URLs prior to displaying their\ncontents, leading to an open redirect vulnerability.\n\nMore information can be found at\nhttps://www.drupal.org/SA-CORE-2015-004CVE-2017-6922 \nGreg Knaddison, Mori Sugimoto and iancawthorne discovered that files\nuploaded by anonymous users into a private file system can be\naccessed by other anonymous users leading to an access bypass\nvulnerability.\n\nMore information can be found at\nhttps://www.drupal.org/SA-CORE-2017-003\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.32-1+deb8u9\", rls_regex:\"DEB8.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.52-2+deb9u1\", rls_regex:\"DEB9.[0-9]+\", remove_arch:TRUE )) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:32:58", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-04-25T00:00:00", "id": "OPENVAS:1361412562310874383", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874383", "title": "Fedora Update for drupal8 FEDORA-2018-922cc2fbaa", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_922cc2fbaa_drupal8_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for drupal8 FEDORA-2018-922cc2fbaa\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874383\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-04-25 08:51:34 +0200 (Wed, 25 Apr 2018)\");\n script_cve_id(\"CVE-2018-7600\", \"CVE-2017-6926\", \"CVE-2017-6927\", \"CVE-2017-6930\",\n \"CVE-2017-6931\", \"CVE-2017-6923\", \"CVE-2017-6924\", \"CVE-2017-6925\",\n \"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\", \"CVE-2017-6928\",\n \"CVE-2017-6929\", \"CVE-2017-6932\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for drupal8 FEDORA-2018-922cc2fbaa\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'drupal8'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"drupal8 on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_xref(name:\"FEDORA\", value:\"2018-922cc2fbaa\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4QXGSUTNGLGN67JM5KBVWO26ICKTRXL\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"drupal8\", rpm:\"drupal8~8.3.9~1.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:58", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-05-12T00:00:00", "id": "OPENVAS:1361412562310874428", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874428", "title": "Fedora Update for drupal7 FEDORA-2018-2359c2ae0e", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_2359c2ae0e_drupal7_fc26.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for drupal7 FEDORA-2018-2359c2ae0e\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874428\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-05-12 06:06:46 +0200 (Sat, 12 May 2018)\");\n script_cve_id(\"CVE-2018-7602\", \"CVE-2018-7600\", \"CVE-2017-6927\", \"CVE-2017-6928\",\n \"CVE-2017-6929\", \"CVE-2017-6932\", \"CVE-2017-6922\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for drupal7 FEDORA-2018-2359c2ae0e\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'drupal7'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"drupal7 on Fedora 26\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-2359c2ae0e\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MFVJWW3I4N6VEV7R3N23SPQMTUAXVS5\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC26\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC26\")\n{\n\n if ((res = isrpmvuln(pkg:\"drupal7\", rpm:\"drupal7~7.59~1.fc26\", rls:\"FC26\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:15", "bulletinFamily": "unix", "description": "\nDrupal Security Team Reports:\n\nCVE-2017-6920: PECL YAML parser unsafe object handling.\nCVE-2017-6921: File REST resource does not properly validate\nCVE-2017-6922: Files uploaded by anonymous users into a private\n\t file system can be accessed by other anonymous users.\n\n", "modified": "2017-06-21T00:00:00", "published": "2017-06-21T00:00:00", "id": "4FC2DF49-6279-11E7-BE0F-6CF0497DB129", "href": "https://vuxml.freebsd.org/freebsd/4fc2df49-6279-11e7-be0f-6cf0497db129.html", "title": "drupal -- Drupal Core - Multiple Vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2019-11-17T18:25:30", "bulletinFamily": "scanner", "description": "According to its self-reported version, the instance of Drupal running\non the remote web server is 7.x prior to 7.56 or 8.x prior to 8.3.4.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A flaw exists in the PECL YAML parser due to unsafe\n handling of PHP objects during certain operations. An\n unauthenticated, remote attacker can exploit this to\n execute arbitrary code. (CVE-2017-6920)\n\n - A flaw exists in the file REST resource due to improper\n validation of user-supplied input to multiple fields\n when manipulating files. An unauthenticated, remote\n attacker can exploit this to have an unspecified impact\n on integrity. Note that a site is only affected by this\n issue if it has the RESTful Web Services (rest) module\n enabled, the file REST resource is enabled and allows\n PATCH requests, and the attacker can get or register a\n user account on the site with permissions to upload\n files and to modify the file resource. (CVE-2017-6921)\n\n - An information disclosure vulnerability exists due to a\n failure to ensure that private files that have been\n uploaded by an anonymous user but not permanently\n attached to content on the site are only visible to the\n anonymous user who uploaded them instead of all\n anonymous users. An unauthenticated, remote attacker can\n exploit this to disclose the files of other anonymous\n users. (CVE-2017-6922)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application", "modified": "2019-11-02T00:00:00", "id": "DRUPAL_8_3_4.NASL", "href": "https://www.tenable.com/plugins/nessus/101063", "published": "2017-06-27T00:00:00", "title": "Drupal 7.x < 7.56 / 8.x < 8.3.4 Multiple Vulnerabilities (SA-CORE-2017-003)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101063);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\"CVE-2017-6920\", \"CVE-2017-6921\", \"CVE-2017-6922\");\n script_bugtraq_id(99211, 99219, 99222);\n\n script_name(english:\"Drupal 7.x < 7.56 / 8.x < 8.3.4 Multiple Vulnerabilities (SA-CORE-2017-003)\");\n script_summary(english:\"Checks the version of Drupal.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A PHP application running on the remote web server is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version, the instance of Drupal running\non the remote web server is 7.x prior to 7.56 or 8.x prior to 8.3.4.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A flaw exists in the PECL YAML parser due to unsafe\n handling of PHP objects during certain operations. An\n unauthenticated, remote attacker can exploit this to\n execute arbitrary code. (CVE-2017-6920)\n\n - A flaw exists in the file REST resource due to improper\n validation of user-supplied input to multiple fields\n when manipulating files. An unauthenticated, remote\n attacker can exploit this to have an unspecified impact\n on integrity. Note that a site is only affected by this\n issue if it has the RESTful Web Services (rest) module\n enabled, the file REST resource is enabled and allows\n PATCH requests, and the attacker can get or register a\n user account on the site with permissions to upload\n files and to modify the file resource. (CVE-2017-6921)\n\n - An information disclosure vulnerability exists due to a\n failure to ensure that private files that have been\n uploaded by an anonymous user but not permanently\n attached to content on the site are only visible to the\n anonymous user who uploaded them instead of all\n anonymous users. An unauthenticated, remote attacker can\n exploit this to disclose the files of other anonymous\n users. (CVE-2017-6922)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.drupal.org/SA-CORE-2017-003\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.drupal.org/project/drupal/releases/7.56\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.drupal.org/project/drupal/releases/8.3.4\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Drupal version 7.56 / 8.3.4 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-6920\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/27\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:drupal:drupal\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"drupal_detect.nasl\");\n script_require_keys(\"installed_sw/Drupal\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 80, 443);\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"http.inc\");\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nport = get_http_port(default:80, php:TRUE);\n\napp_info = vcf::get_app_info(app:\"Drupal\", port:port, webapp:true);\n\nvcf::check_granularity(app_info:app_info, sig_segments:2);\n\nconstraints = [\n { \"min_version\" : \"7.0\", \"max_version\" : \"7.55\", \"fixed_version\" : \"7.56\" },\n { \"min_version\" : \"8.0\", \"max_version\" : \"8.3.3\", \"fixed_version\" : \"8.3.4\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-01T02:27:53", "bulletinFamily": "scanner", "description": "-\n [7.56](https://www.drupal.org/project/drupal/releases/7.\n 56)\n\n -\n [SA-CORE-2017-003](https://www.drupal.org/SA-CORE-2017-0\n 03)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2017-38113758E7.NASL", "href": "https://www.tenable.com/plugins/nessus/101212", "published": "2017-07-05T00:00:00", "title": "Fedora 25 : drupal7 (2017-38113758e7)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-38113758e7.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101212);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2019/09/24 14:09:06\");\n\n script_cve_id(\"CVE-2017-6922\");\n script_xref(name:\"FEDORA\", value:\"2017-38113758e7\");\n\n script_name(english:\"Fedora 25 : drupal7 (2017-38113758e7)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"-\n [7.56](https://www.drupal.org/project/drupal/releases/7.\n 56)\n\n -\n [SA-CORE-2017-003](https://www.drupal.org/SA-CORE-2017-0\n 03)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-38113758e7\"\n );\n # https://www.drupal.org/SA-CORE-2017-003\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?34ea2f5d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected drupal7 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"drupal7-7.56-1.fc25\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"drupal7\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T02:18:16", "bulletinFamily": "scanner", "description": "Private files that have been uploaded by an anonymous user but not\npermanently attached to content on the site should only be visible to\nthe anonymous user that uploaded them, rather than all anonymous\nusers. Drupal core did not previously provide this protection,\nallowing an access bypass vulnerability to occur. This issue is\nmitigated by the fact that in order to be affected, the site must\nallow anonymous users to upload files into a private file system. \n\nFor Debian 7 ", "modified": "2019-11-02T00:00:00", "id": "DEBIAN_DLA-1004.NASL", "href": "https://www.tenable.com/plugins/nessus/101092", "published": "2017-06-29T00:00:00", "title": "Debian DLA-1004-1 : drupal7 security update", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-1004-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101092);\n script_version(\"3.8\");\n script_cvs_date(\"Date: 2019/02/14 10:37:32\");\n\n script_cve_id(\"CVE-2017-6922\");\n\n script_name(english:\"Debian DLA-1004-1 : drupal7 security update\");\n script_summary(english:\"Checks dpkg output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Private files that have been uploaded by an anonymous user but not\npermanently attached to content on the site should only be visible to\nthe anonymous user that uploaded them, rather than all anonymous\nusers. Drupal core did not previously provide this protection,\nallowing an access bypass vulnerability to occur. This issue is\nmitigated by the fact that in order to be affected, the site must\nallow anonymous users to upload files into a private file system. \n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n7.14-2+deb7u16.\n\nWe recommend that you upgrade your drupal7 packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2017/06/msg00034.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/drupal7\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Upgrade the affected drupal7 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"drupal7\", reference:\"7.14-2+deb7u16\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T02:28:11", "bulletinFamily": "scanner", "description": "-\n [7.56](https://www.drupal.org/project/drupal/releases/7.\n 56)\n\n -\n [SA-CORE-2017-003](https://www.drupal.org/SA-CORE-2017-0\n 03)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2017-6874606E19.NASL", "href": "https://www.tenable.com/plugins/nessus/101649", "published": "2017-07-17T00:00:00", "title": "Fedora 26 : drupal7 (2017-6874606e19)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-6874606e19.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101649);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2019/09/24 14:09:07\");\n\n script_cve_id(\"CVE-2017-6922\");\n script_xref(name:\"FEDORA\", value:\"2017-6874606e19\");\n\n script_name(english:\"Fedora 26 : drupal7 (2017-6874606e19)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"-\n [7.56](https://www.drupal.org/project/drupal/releases/7.\n 56)\n\n -\n [SA-CORE-2017-003](https://www.drupal.org/SA-CORE-2017-0\n 03)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-6874606e19\"\n );\n # https://www.drupal.org/SA-CORE-2017-003\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?34ea2f5d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected drupal7 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"drupal7-7.56-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"drupal7\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T02:29:04", "bulletinFamily": "scanner", "description": "-\n [7.56](https://www.drupal.org/project/drupal/releases/7.\n 56)\n\n -\n [SA-CORE-2017-003](https://www.drupal.org/SA-CORE-2017-0\n 03)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2017-E8A2017B3C.NASL", "href": "https://www.tenable.com/plugins/nessus/101216", "published": "2017-07-05T00:00:00", "title": "Fedora 24 : drupal7 (2017-e8a2017b3c)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-e8a2017b3c.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101216);\n script_version(\"3.6\");\n script_cvs_date(\"Date: 2019/09/24 14:09:09\");\n\n script_cve_id(\"CVE-2017-6922\");\n script_xref(name:\"FEDORA\", value:\"2017-e8a2017b3c\");\n\n script_name(english:\"Fedora 24 : drupal7 (2017-e8a2017b3c)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"-\n [7.56](https://www.drupal.org/project/drupal/releases/7.\n 56)\n\n -\n [SA-CORE-2017-003](https://www.drupal.org/SA-CORE-2017-0\n 03)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-e8a2017b3c\"\n );\n # https://www.drupal.org/SA-CORE-2017-003\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?34ea2f5d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected drupal7 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:24\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^24([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 24\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC24\", reference:\"drupal7-7.56-1.fc24\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"drupal7\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T02:21:42", "bulletinFamily": "scanner", "description": "Two vulnerabilities were discovered in Drupal, a fully-featured\ncontent management framework. The Common Vulnerabilities and Exposures\nproject identifies the following issues :\n\n - CVE-2015-7943\n Samuel Mortenson and Pere Orga discovered that the\n overlay module does not sufficiently validate URLs prior\n to displaying their contents, leading to an open\n redirect vulnerability.\n\n More information can be found at\n https://www.drupal.org/SA-CORE-2015-004\n\n - CVE-2017-6922\n Greg Knaddison, Mori Sugimoto and iancawthorne\n discovered that files uploaded by anonymous users into a\n private file system can be accessed by other anonymous\n users leading to an access bypass vulnerability.\n\n More information can be found at\n https://www.drupal.org/SA-CORE-2017-003", "modified": "2019-11-02T00:00:00", "id": "DEBIAN_DSA-3897.NASL", "href": "https://www.tenable.com/plugins/nessus/101034", "published": "2017-06-26T00:00:00", "title": "Debian DSA-3897-1 : drupal7 - security update", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3897. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101034);\n script_version(\"3.9\");\n script_cvs_date(\"Date: 2019/02/14 10:37:32\");\n\n script_cve_id(\"CVE-2015-7943\", \"CVE-2017-6922\");\n script_xref(name:\"DSA\", value:\"3897\");\n\n script_name(english:\"Debian DSA-3897-1 : drupal7 - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Two vulnerabilities were discovered in Drupal, a fully-featured\ncontent management framework. The Common Vulnerabilities and Exposures\nproject identifies the following issues :\n\n - CVE-2015-7943\n Samuel Mortenson and Pere Orga discovered that the\n overlay module does not sufficiently validate URLs prior\n to displaying their contents, leading to an open\n redirect vulnerability.\n\n More information can be found at\n https://www.drupal.org/SA-CORE-2015-004\n\n - CVE-2017-6922\n Greg Knaddison, Mori Sugimoto and iancawthorne\n discovered that files uploaded by anonymous users into a\n private file system can be accessed by other anonymous\n users leading to an access bypass vulnerability.\n\n More information can be found at\n https://www.drupal.org/SA-CORE-2017-003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865498\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-7943\"\n );\n # https://www.drupal.org/SA-CORE-2015-004\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?034c342d\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2017-6922\"\n );\n # https://www.drupal.org/SA-CORE-2017-003\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?34ea2f5d\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-7943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/drupal7\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/drupal7\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-3897\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the drupal7 packages.\n\nFor the oldstable distribution (jessie), these problems have been\nfixed in version 7.32-1+deb8u9.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 7.52-2+deb9u1. For the stable distribution (stretch),\nCVE-2015-7943 was already fixed before the initial release.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/10/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"drupal7\", reference:\"7.32-1+deb8u9\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"drupal7\", reference:\"7.52-2+deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "debian": [{"lastseen": "2019-05-30T02:21:38", "bulletinFamily": "unix", "description": "Package : drupal7\nVersion : 7.14-2+deb7u16\nCVE ID : CVE-2017-6922\n\nPrivate files that have been uploaded by an anonymous user but not permanently\nattached to content on the site should only be visible to the anonymous user\nthat uploaded them, rather than all anonymous users. Drupal core did not\npreviously provide this protection, allowing an access bypass vulnerability to\noccur. This issue is mitigated by the fact that in order to be affected, the\nsite must allow anonymous users to upload files into a private file system. \n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n7.14-2+deb7u16.\n\nWe recommend that you upgrade your drupal7 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "modified": "2017-06-28T16:19:36", "published": "2017-06-28T16:19:36", "id": "DEBIAN:DLA-1004-1:9EDA0", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201706/msg00034.html", "title": "[SECURITY] [DLA 1004-1] drupal7 security update", "type": "debian", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-05-30T02:21:40", "bulletinFamily": "unix", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3897-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nJune 24, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : drupal7\nCVE ID : CVE-2015-7943 CVE-2017-6922\nDebian Bug : 865498\n\nTwo vulnerabilities were discovered in Drupal, a fully-featured content\nmanagement framework. The Common Vulnerabilities and Exposures project\nidentifies the following issues:\n\nCVE-2015-7943\n\n Samuel Mortenson and Pere Orga discovered that the overlay module\n does not sufficiently validate URLs prior to displaying their\n contents, leading to an open redirect vulnerability.\n\n More information can be found at\n https://www.drupal.org/SA-CORE-2015-004\n\nCVE-2017-6922\n\n Greg Knaddison, Mori Sugimoto and iancawthorne discovered that files\n uploaded by anonymous users into a private file system can be\n accessed by other anonymous users leading to an access bypass\n vulnerability.\n\n More information can be found at\n https://www.drupal.org/SA-CORE-2017-003\n\nFor the oldstable distribution (jessie), these problems have been fixed\nin version 7.32-1+deb8u9.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 7.52-2+deb9u1. For the stable distribution (stretch),\nCVE-2015-7943 was already fixed before the initial release.\n\nWe recommend that you upgrade your drupal7 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "modified": "2017-06-24T05:31:22", "published": "2017-06-24T05:31:22", "id": "DEBIAN:DSA-3897-1:BAC5F", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00157.html", "title": "[SECURITY] [DSA 3897-1] drupal7 security update", "type": "debian", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}]}