Lucene search

K

Debian: Security Advisory (DLA-2263-1)

🗓️ 01 Jul 2020 00:00:00Reported by Copyright (C) 2020 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 19 Views

The remote host is missing an update for the Debian 'drupal7' package(s) announced via the DLA-2263-1 advisory. CVE-2020-13663 - Drupal SA 2020-004 The Drupal core Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities. For Debian 8 Jessie, this problem has been fixed in version 7.32-1+deb8u19. We recommend that you upgrade your drupal7 packages

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OSV
BIT-drupal-2020-13663
6 Mar 202410:58
osv
OSV
drupal7 - security update
18 Jun 202000:00
osv
OSV
drupal7 - security update
29 Jun 202000:00
osv
OSV
Drupal Core Cross-Site Request Forgery (CSRF) vulnerability
24 May 202219:05
osv
OSV
CVE-2020-13663
11 Jun 202116:15
osv
Debian CVE
CVE-2020-13663
11 Jun 202116:15
debiancve
Prion
Cross site request forgery (csrf)
11 Jun 202116:15
prion
Drupal
Drupal core - Critical - Cross Site Request Forgery - SA-CORE-2020-004
17 Jun 202000:00
drupal
Debian
[SECURITY] [DLA 2263-1] drupal7 security update
30 Jun 202009:01
debian
Debian
[SECURITY] [DSA 4706-1] drupal7 security update
18 Jun 202020:24
debian
Rows per page
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.892263");
  script_cve_id("CVE-2020-13663");
  script_tag(name:"creation_date", value:"2020-07-01 03:00:38 +0000 (Wed, 01 Jul 2020)");
  script_version("2024-02-02T05:06:07+0000");
  script_tag(name:"last_modification", value:"2024-02-02 05:06:07 +0000 (Fri, 02 Feb 2024)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2021-06-21 18:11:25 +0000 (Mon, 21 Jun 2021)");

  script_name("Debian: Security Advisory (DLA-2263-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2020 Greenbone AG");
  script_family("Debian Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB8");

  script_xref(name:"Advisory-ID", value:"DLA-2263-1");
  script_xref(name:"URL", value:"https://www.debian.org/lts/security/2020/DLA-2263-1");
  script_xref(name:"URL", value:"https://wiki.debian.org/LTS");

  script_tag(name:"summary", value:"The remote host is missing an update for the Debian 'drupal7' package(s) announced via the DLA-2263-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"CVE-2020-13663 - Drupal SA 2020-004

The Drupal core Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities.

For Debian 8 Jessie, this problem has been fixed in version 7.32-1+deb8u19.

We recommend that you upgrade your drupal7 packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]");

  script_tag(name:"affected", value:"'drupal7' package(s) on Debian 8.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

release = dpkg_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "DEB8") {

  if(!isnull(res = isdpkgvuln(pkg:"drupal7", ver:"7.32-1+deb8u19", rls:"DEB8"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Jul 2020 00:00Current
8.8High risk
Vulners AI Score8.8
CVSS26.8
CVSS38.8
EPSS0.0022
19
.json
Report