ID OPENVAS:702913 Type openvas Reporter Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net Modified 2017-07-14T00:00:00
Description
An information disclosure vulnerability was discovered in Drupal, a
fully-featured content management framework. When pages are cached for
anonymous users, form state may leak between anonymous users. Sensitive
or private information recorded for one anonymous user could thus be
disclosed to other users interacting with the same form at the same
time.
This security update introduces small API changes, see the upstream
advisory at drupal.org/SA-CORE-2014-002
for further information.
# OpenVAS Vulnerability Test
# $Id: deb_2913.nasl 6724 2017-07-14 09:57:17Z teissa $
# Auto-generated from advisory DSA 2913-1 using nvtgen 1.0
# Script version: 1.0
#
# Author:
# Greenbone Networks
#
# Copyright:
# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
tag_affected = "drupal7 on Debian Linux";
tag_insight = "Drupal is a dynamic web site platform which allows an individual or
community of users to publish, manage and organize a variety of
content, Drupal integrates many popular features of content
management systems, weblogs, collaborative tools and discussion-based
community software into one easy-to-use package.";
tag_solution = "For the stable distribution (wheezy), this problem has been fixed in
version 7.14-2+deb7u4.
For the testing distribution (jessie), this problem has been fixed in
version 7.27-1.
For the unstable distribution (sid), this problem has been fixed in
version 7.27-1.
We recommend that you upgrade your drupal7 packages.";
tag_summary = "An information disclosure vulnerability was discovered in Drupal, a
fully-featured content management framework. When pages are cached for
anonymous users, form state may leak between anonymous users. Sensitive
or private information recorded for one anonymous user could thus be
disclosed to other users interacting with the same form at the same
time.
This security update introduces small API changes, see the upstream
advisory at drupal.org/SA-CORE-2014-002
for further information.";
tag_vuldetect = "This check tests the installed software version using the apt package manager.";
if(description)
{
script_id(702913);
script_version("$Revision: 6724 $");
script_cve_id("CVE-2014-2983");
script_name("Debian Security Advisory DSA 2913-1 (drupal7 - security update)");
script_tag(name: "last_modification", value:"$Date: 2017-07-14 11:57:17 +0200 (Fri, 14 Jul 2017) $");
script_tag(name: "creation_date", value:"2014-04-25 00:00:00 +0200 (Fri, 25 Apr 2014)");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_xref(name: "URL", value: "http://www.debian.org/security/2014/dsa-2913.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
script_tag(name: "affected", value: tag_affected);
script_tag(name: "insight", value: tag_insight);
# script_tag(name: "impact", value: tag_impact);
script_tag(name: "solution", value: tag_solution);
script_tag(name: "summary", value: tag_summary);
script_tag(name: "vuldetect", value: tag_vuldetect);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
res = "";
report = "";
if ((res = isdpkgvuln(pkg:"drupal7", ver:"7.14-2+deb7u4", rls:"DEB7.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"drupal7", ver:"7.14-2+deb7u4", rls:"DEB7.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"drupal7", ver:"7.14-2+deb7u4", rls:"DEB7.2")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"drupal7", ver:"7.14-2+deb7u4", rls:"DEB7.3")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"id": "OPENVAS:702913", "type": "openvas", "bulletinFamily": "scanner", "title": "Debian Security Advisory DSA 2913-1 (drupal7 - security update)", "description": "An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002 \nfor further information.", "published": "2014-04-25T00:00:00", "modified": "2017-07-14T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=702913", "reporter": "Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net", "references": ["http://www.debian.org/security/2014/dsa-2913.html"], "cvelist": ["CVE-2014-2983"], "lastseen": "2017-07-31T10:48:28", "viewCount": 0, "enchantments": {"score": {"value": 4.4, "vector": "NONE", "modified": "2017-07-31T10:48:28", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-2983"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2913-1:44CC8", "DEBIAN:DSA-2914-1:A726C"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310702914", "OPENVAS:702914", "OPENVAS:1361412562310702913"]}, {"type": "nessus", "idList": ["DRUPAL_6_31.NASL", "DRUPAL_7_27.NASL", "MANDRIVA_MDVSA-2015-181.NASL", "DEBIAN_DSA-2914.NASL", "DEBIAN_DSA-2913.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14479", "SECURITYVULNS:VULN:13714", "SECURITYVULNS:DOC:32107", "SECURITYVULNS:DOC:30557", "SECURITYVULNS:DOC:30558"]}, {"type": "drupal", "idList": ["DRUPAL-SA-CORE-2014-002"]}], "modified": "2017-07-31T10:48:28", "rev": 2}, "vulnersScore": 4.4}, "pluginID": "702913", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2913.nasl 6724 2017-07-14 09:57:17Z teissa $\n# Auto-generated from advisory DSA 2913-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_affected = \"drupal7 on Debian Linux\";\ntag_insight = \"Drupal is a dynamic web site platform which allows an individual or\ncommunity of users to publish, manage and organize a variety of\ncontent, Drupal integrates many popular features of content\nmanagement systems, weblogs, collaborative tools and discussion-based\ncommunity software into one easy-to-use package.\";\ntag_solution = \"For the stable distribution (wheezy), this problem has been fixed in\nversion 7.14-2+deb7u4.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 7.27-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 7.27-1.\n\nWe recommend that you upgrade your drupal7 packages.\";\ntag_summary = \"An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002 \nfor further information.\";\ntag_vuldetect = \"This check tests the installed software version using the apt package manager.\";\n\nif(description)\n{\n script_id(702913);\n script_version(\"$Revision: 6724 $\");\n script_cve_id(\"CVE-2014-2983\");\n script_name(\"Debian Security Advisory DSA 2913-1 (drupal7 - security update)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-14 11:57:17 +0200 (Fri, 14 Jul 2017) $\");\n script_tag(name: \"creation_date\", value:\"2014-04-25 00:00:00 +0200 (Fri, 25 Apr 2014)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-2913.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: tag_affected);\n script_tag(name: \"insight\", value: tag_insight);\n# script_tag(name: \"impact\", value: tag_impact);\n script_tag(name: \"solution\", value: tag_solution);\n script_tag(name: \"summary\", value: tag_summary);\n script_tag(name: \"vuldetect\", value: tag_vuldetect);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.14-2+deb7u4\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.14-2+deb7u4\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.14-2+deb7u4\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.14-2+deb7u4\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "naslFamily": "Debian Local Security Checks", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T06:14:28", "description": "Drupal 6.x before 6.31 and 7.x before 7.27 does not properly isolate the cached data of different anonymous users, which allows remote anonymous users to obtain sensitive interim form input information in opportunistic situations via unspecified vectors.", "edition": 6, "cvss3": {}, "published": "2014-04-23T15:55:00", "title": "CVE-2014-2983", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-2983"], "modified": "2017-12-16T02:29:00", "cpe": ["cpe:/a:drupal:drupal:7.21", "cpe:/a:drupal:drupal:7.11", "cpe:/a:drupal:drupal:6.1", "cpe:/a:drupal:drupal:7.19", "cpe:/a:drupal:drupal:6.10", "cpe:/a:drupal:drupal:7.16", "cpe:/a:drupal:drupal:6.2", "cpe:/a:drupal:drupal:6.18", "cpe:/a:drupal:drupal:7.20", "cpe:/a:drupal:drupal:7.18", "cpe:/a:drupal:drupal:6.14", "cpe:/a:drupal:drupal:6.22", "cpe:/a:drupal:drupal:6.15", "cpe:/a:drupal:drupal:7.23", "cpe:/a:drupal:drupal:7.10", "cpe:/a:drupal:drupal:6.3", "cpe:/a:drupal:drupal:6.24", "cpe:/a:drupal:drupal:7.13", "cpe:/a:drupal:drupal:6.23", "cpe:/a:drupal:drupal:6.16", "cpe:/a:drupal:drupal:6.29", "cpe:/a:drupal:drupal:7.12", "cpe:/a:drupal:drupal:7.26", "cpe:/a:drupal:drupal:6.12", "cpe:/a:drupal:drupal:7.2", "cpe:/a:drupal:drupal:7.1", "cpe:/a:drupal:drupal:6.27", "cpe:/a:drupal:drupal:6.20", "cpe:/a:drupal:drupal:7.17", "cpe:/a:drupal:drupal:6.21", "cpe:/a:drupal:drupal:7.24", "cpe:/a:drupal:drupal:6.25", "cpe:/a:drupal:drupal:7.25", "cpe:/a:drupal:drupal:7.14", "cpe:/a:drupal:drupal:7.15", "cpe:/a:drupal:drupal:6.11", "cpe:/a:drupal:drupal:7.0", "cpe:/a:drupal:drupal:7.22", "cpe:/a:drupal:drupal:6.28", "cpe:/a:drupal:drupal:6.17", "cpe:/a:drupal:drupal:6.30", "cpe:/a:drupal:drupal:6.0", "cpe:/a:drupal:drupal:6.19", "cpe:/a:drupal:drupal:6.13", "cpe:/a:drupal:drupal:6.26"], "id": "CVE-2014-2983", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2983", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-08-01T10:48:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2983"], "description": "An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002 \nfor further information.", "modified": "2017-07-17T00:00:00", "published": "2014-04-25T00:00:00", "id": "OPENVAS:702914", "href": "http://plugins.openvas.org/nasl.php?oid=702914", "type": "openvas", "title": "Debian Security Advisory DSA 2914-1 (drupal6 - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2914.nasl 6735 2017-07-17 09:56:49Z teissa $\n# Auto-generated from advisory DSA 2914-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_affected = \"drupal6 on Debian Linux\";\ntag_insight = \"Drupal is a dynamic web site platform which allows an individual or\ncommunity of users to publish, manage and organize a variety of\ncontent, Drupal integrates many popular features of content\nmanagement systems, weblogs, collaborative tools and discussion-based\ncommunity software into one easy-to-use package.\";\ntag_solution = \"For the oldstable distribution (squeeze), this problem has been fixed in\nversion 6.31-1.\n\nWe recommend that you upgrade your drupal6 packages.\";\ntag_summary = \"An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002 \nfor further information.\";\ntag_vuldetect = \"This check tests the installed software version using the apt package manager.\";\n\nif(description)\n{\n script_id(702914);\n script_version(\"$Revision: 6735 $\");\n script_cve_id(\"CVE-2014-2983\");\n script_name(\"Debian Security Advisory DSA 2914-1 (drupal6 - security update)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-17 11:56:49 +0200 (Mon, 17 Jul 2017) $\");\n script_tag(name: \"creation_date\", value:\"2014-04-25 00:00:00 +0200 (Fri, 25 Apr 2014)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-2914.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: tag_affected);\n script_tag(name: \"insight\", value: tag_insight);\n# script_tag(name: \"impact\", value: tag_impact);\n script_tag(name: \"solution\", value: tag_solution);\n script_tag(name: \"summary\", value: tag_summary);\n script_tag(name: \"vuldetect\", value: tag_vuldetect);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"drupal6\", ver:\"6.31-1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2019-05-29T18:37:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2983"], "description": "An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002\nfor further information.", "modified": "2019-03-18T00:00:00", "published": "2014-04-25T00:00:00", "id": "OPENVAS:1361412562310702914", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310702914", "type": "openvas", "title": "Debian Security Advisory DSA 2914-1 (drupal6 - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2914.nasl 14277 2019-03-18 14:45:38Z cfischer $\n# Auto-generated from advisory DSA 2914-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.702914\");\n script_version(\"$Revision: 14277 $\");\n script_cve_id(\"CVE-2014-2983\");\n script_name(\"Debian Security Advisory DSA 2914-1 (drupal6 - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:45:38 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-25 00:00:00 +0200 (Fri, 25 Apr 2014)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-2914.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB6\");\n script_tag(name:\"affected\", value:\"drupal6 on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (squeeze), this problem has been fixed in\nversion 6.31-1.\n\nWe recommend that you upgrade your drupal6 packages.\");\n script_tag(name:\"summary\", value:\"An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002\nfor further information.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"drupal6\", ver:\"6.31-1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:37:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2983"], "description": "An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002\nfor further information.", "modified": "2019-03-19T00:00:00", "published": "2014-04-25T00:00:00", "id": "OPENVAS:1361412562310702913", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310702913", "type": "openvas", "title": "Debian Security Advisory DSA 2913-1 (drupal7 - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2913.nasl 14302 2019-03-19 08:28:48Z cfischer $\n# Auto-generated from advisory DSA 2913-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.702913\");\n script_version(\"$Revision: 14302 $\");\n script_cve_id(\"CVE-2014-2983\");\n script_name(\"Debian Security Advisory DSA 2913-1 (drupal7 - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 09:28:48 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-25 00:00:00 +0200 (Fri, 25 Apr 2014)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-2913.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n script_tag(name:\"affected\", value:\"drupal7 on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (wheezy), this problem has been fixed in\nversion 7.14-2+deb7u4.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 7.27-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 7.27-1.\n\nWe recommend that you upgrade your drupal7 packages.\");\n script_tag(name:\"summary\", value:\"An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002\nfor further information.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"drupal7\", ver:\"7.14-2+deb7u4\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}], "debian": [{"lastseen": "2019-05-30T02:22:14", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2983"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2914-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nApril 25, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : drupal6\nCVE ID : CVE-2014-2983\n\nAn information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at https://drupal.org/SA-CORE-2014-002 for further information.\n\nFor the oldstable distribution (squeeze), this problem has been fixed in\nversion 6.31-1.\n\nWe recommend that you upgrade your drupal6 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 2, "modified": "2014-04-25T20:18:20", "published": "2014-04-25T20:18:20", "id": "DEBIAN:DSA-2914-1:A726C", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00094.html", "title": "[SECURITY] [DSA 2914-1] drupal6 security update", "type": "debian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-08-12T01:10:36", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2983"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2913-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nApril 25, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : drupal7\nCVE ID : CVE-2014-2983\n\nAn information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users. Sensitive\nor private information recorded for one anonymous user could thus be\ndisclosed to other users interacting with the same form at the same\ntime.\n\nThis security update introduces small API changes, see the upstream\nadvisory at https://drupal.org/SA-CORE-2014-002 for further information.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 7.14-2+deb7u4.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 7.27-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 7.27-1.\n\nWe recommend that you upgrade your drupal7 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2014-04-25T20:18:16", "published": "2014-04-25T20:18:16", "id": "DEBIAN:DSA-2913-1:44CC8", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00093.html", "title": "[SECURITY] [DSA 2913-1] drupal7 security update", "type": "debian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2021-01-12T09:48:29", "description": "An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users.\nSensitive or private information recorded for one anonymous user could\nthus be disclosed to other users interacting with the same form at the\nsame time.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002 for further information.", "edition": 16, "published": "2014-04-27T00:00:00", "title": "Debian DSA-2914-1 : drupal6 - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2983"], "modified": "2014-04-27T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:6.0", "p-cpe:/a:debian:debian_linux:drupal6"], "id": "DEBIAN_DSA-2914.NASL", "href": "https://www.tenable.com/plugins/nessus/73715", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2914. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73715);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-2983\");\n script_bugtraq_id(66977);\n script_xref(name:\"DSA\", value:\"2914\");\n\n script_name(english:\"Debian DSA-2914-1 : drupal6 - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users.\nSensitive or private information recorded for one anonymous user could\nthus be disclosed to other users interacting with the same form at the\nsame time.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002 for further information.\"\n );\n # https://drupal.org/SA-CORE-2014-002\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4ca0aa11\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze/drupal6\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2014/dsa-2914\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the drupal6 packages.\n\nFor the oldstable distribution (squeeze), this problem has been fixed\nin version 6.31-1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:drupal6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"6.0\", prefix:\"drupal6\", reference:\"6.31-1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-20T10:04:04", "description": "The remote web server is running a version of Drupal that is 6.x prior\nto 6.31. It is, therefore, affected by an error related to the HTML\nform API and the caching of pages for different anonymous users, which\ncould allow sensitive information to be disclosed. Note that Drupal\ncore does not expose any such HTML forms by default.\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.", "edition": 28, "published": "2014-04-21T00:00:00", "title": "Drupal 6.x < 6.31 Forms API Information Disclosure", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2983"], "modified": "2014-04-21T00:00:00", "cpe": ["cpe:/a:drupal:drupal"], "id": "DRUPAL_6_31.NASL", "href": "https://www.tenable.com/plugins/nessus/73634", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73634);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2014-2983\");\n script_bugtraq_id(66977);\n\n script_name(english:\"Drupal 6.x < 6.31 Forms API Information Disclosure\");\n script_summary(english:\"Checks the version of Drupal.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server is running a PHP application that is affected by\nan information disclosure vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote web server is running a version of Drupal that is 6.x prior\nto 6.31. It is, therefore, affected by an error related to the HTML\nform API and the caching of pages for different anonymous users, which\ncould allow sensitive information to be disclosed. Note that Drupal\ncore does not expose any such HTML forms by default.\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.\");\n # https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-04-16/sa-core-2014-002-drupal-core\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4ca0aa11\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.drupal.org/drupal-6.31-release-notes\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to version 6.31 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/21\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:drupal:drupal\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"drupal_detect.nasl\");\n script_require_keys(\"www/PHP\", \"installed_sw/Drupal\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 80);\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"install_func.inc\");\n\napp = \"Drupal\";\nget_install_count(app_name:app, exit_if_zero:TRUE);\n\nport = get_http_port(default:80, php:TRUE);\n\ninstall = get_single_install(\n app_name : app,\n port : port,\n exit_if_unknown_ver : TRUE\n);\n\ndir = install['path'];\nversion = install['version'];\nurl = build_url(qs:dir, port:port);\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nfix = '6.31';\nif (version =~ \"^6\\.([0-9]|[12][0-9]|30)($|[^0-9]+)\")\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n URL : ' + url +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_WEB_APP_NOT_AFFECTED, app, url, version);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-20T10:04:06", "description": "The remote web server is running a version of Drupal that is 7.x prior\nto 7.27. It is, therefore, affected by an error related to the HTML\nform API and the caching of pages for different anonymous users, which\ncould allow sensitive information to be disclosed. Note that Drupal\ncore does not expose any such HTML forms by default.\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.", "edition": 28, "published": "2014-04-21T00:00:00", "title": "Drupal 7.x < 7.27 Forms API Information Disclosure", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2983"], "modified": "2014-04-21T00:00:00", "cpe": ["cpe:/a:drupal:drupal"], "id": "DRUPAL_7_27.NASL", "href": "https://www.tenable.com/plugins/nessus/73635", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73635);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2014-2983\");\n script_bugtraq_id(66977);\n\n script_name(english:\"Drupal 7.x < 7.27 Forms API Information Disclosure\");\n script_summary(english:\"Checks the version of Drupal.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server is running a PHP application that is affected by\nan information disclosure vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote web server is running a version of Drupal that is 7.x prior\nto 7.27. It is, therefore, affected by an error related to the HTML\nform API and the caching of pages for different anonymous users, which\ncould allow sensitive information to be disclosed. Note that Drupal\ncore does not expose any such HTML forms by default.\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.\");\n # https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-04-16/sa-core-2014-002-drupal-core\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4ca0aa11\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.drupal.org/drupal-7.27-release-notes\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to version 7.27 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/21\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:drupal:drupal\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"drupal_detect.nasl\");\n script_require_keys(\"www/PHP\", \"installed_sw/Drupal\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 80);\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"install_func.inc\");\n\napp = \"Drupal\";\nget_install_count(app_name:app, exit_if_zero:TRUE);\n\nport = get_http_port(default:80, php:TRUE);\n\ninstall = get_single_install(\n app_name : app,\n port : port,\n exit_if_unknown_ver : TRUE\n);\n\ndir = install['path'];\nversion = install['version'];\nurl = build_url(qs:dir, port:port);\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nfix = '7.27';\nif (version =~ \"^7\\.([0-9]|1[0-9]|2[0-6])($|[^0-9]+)\")\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n URL : ' + url +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_WEB_APP_NOT_AFFECTED, app, url, version);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-12T09:48:28", "description": "An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users.\nSensitive or private information recorded for one anonymous user could\nthus be disclosed to other users interacting with the same form at the\nsame time.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002 for further information.", "edition": 16, "published": "2014-04-27T00:00:00", "title": "Debian DSA-2913-1 : drupal7 - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-2983"], "modified": "2014-04-27T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:drupal7", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DSA-2913.NASL", "href": "https://www.tenable.com/plugins/nessus/73714", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2913. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73714);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-2983\");\n script_bugtraq_id(66977);\n script_xref(name:\"DSA\", value:\"2913\");\n\n script_name(english:\"Debian DSA-2913-1 : drupal7 - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An information disclosure vulnerability was discovered in Drupal, a\nfully-featured content management framework. When pages are cached for\nanonymous users, form state may leak between anonymous users.\nSensitive or private information recorded for one anonymous user could\nthus be disclosed to other users interacting with the same form at the\nsame time.\n\nThis security update introduces small API changes, see the upstream\nadvisory at drupal.org/SA-CORE-2014-002 for further information.\"\n );\n # https://drupal.org/SA-CORE-2014-002\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4ca0aa11\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/drupal7\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2014/dsa-2913\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the drupal7 packages.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 7.14-2+deb7u4.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:drupal7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"drupal7\", reference:\"7.14-2+deb7u4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-17T11:51:47", "description": "Updated drupal packages fix security vulnerabilities :\n\nAn information disclosure vulnerability was discovered in Drupal\nbefore 7.27. When pages are cached for anonymous users, form state may\nleak between anonymous users. Sensitive or private information\nrecorded for one anonymous user could thus be disclosed to other users\ninteracting with the same form at the same time (CVE-2014-2983).\n\nMultiple security issues in Drupal before 7.29, including a denial of\nservice issue, an access bypass issue in the File module, and multiple\ncross-site scripting issues (CVE-2014-5019, CVE-2014-5020,\nCVE-2014-5021, CVE-2014-5022).\n\nA denial of service issue exists in Drupal before 7.31, due to XML\nentity expansion in a publicly accessible XML-RPC endpoint.\n\nA SQL Injection issue exists in Drupal before 7.32 due to the way the\nDrupal core handles prepared statements. A malicious user can inject\narbitrary SQL queries, and thereby completely control the Drupal site.\nThis vulnerability can be exploited by remote attackers without any\nkind of authentication required (CVE-2014-3704).\n\nAaron Averill discovered that a specially crafted request can give a\nuser access to another user's session, allowing an attacker to hijack\na random session (CVE-2014-9015).\n\nMichael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that\nthe password hashing API allows an attacker to send specially crafted\nrequests resulting in CPU and memory exhaustion. This may lead to the\nsite becoming unavailable or unresponsive (denial of service)\n(CVE-2014-9016). anonymous users (CVE-2014-9016).\n\nPassword reset URLs can be forged under certain circumstances,\nallowing an attacker to gain access to another user's account without\nknowing the account's password (CVE-2015-2559).\n\nUnder certain circumstances, malicious users can construct a URL that\nwill trick users into being redirected to a 3rd party website, thereby\nexposing the users to potential social engineering attacks. In\naddition, several URL-related API functions in Drupal 6 and 7 can be\ntricked into passing through external URLs when not intending to,\npotentially leading to additional open redirect vulnerabilities\n(CVE-2015-2749, CVE-2015-2750).\n\nThe drupal package has been updated to version 7.35 to fix this issue\nand other bugs. See the upstream advisory and release notes for more\ndetails.", "edition": 26, "published": "2015-03-31T00:00:00", "title": "Mandriva Linux Security Advisory : drupal (MDVSA-2015:181)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-2750", "CVE-2014-9015", "CVE-2015-2749", "CVE-2014-5020", "CVE-2014-5021", "CVE-2014-2983", "CVE-2014-3704", "CVE-2014-5019", "CVE-2015-2559", "CVE-2014-5022", "CVE-2014-9016"], "modified": "2015-03-31T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:drupal-sqlite", "p-cpe:/a:mandriva:linux:drupal-postgresql", "p-cpe:/a:mandriva:linux:drupal", "p-cpe:/a:mandriva:linux:drupal-mysql"], "id": "MANDRIVA_MDVSA-2015-181.NASL", "href": "https://www.tenable.com/plugins/nessus/82456", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2015:181. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82456);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-2983\", \"CVE-2014-3704\", \"CVE-2014-5019\", \"CVE-2014-5020\", \"CVE-2014-5021\", \"CVE-2014-5022\", \"CVE-2014-9015\", \"CVE-2014-9016\", \"CVE-2015-2559\", \"CVE-2015-2749\", \"CVE-2015-2750\");\n script_xref(name:\"MDVSA\", value:\"2015:181\");\n\n script_name(english:\"Mandriva Linux Security Advisory : drupal (MDVSA-2015:181)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated drupal packages fix security vulnerabilities :\n\nAn information disclosure vulnerability was discovered in Drupal\nbefore 7.27. When pages are cached for anonymous users, form state may\nleak between anonymous users. Sensitive or private information\nrecorded for one anonymous user could thus be disclosed to other users\ninteracting with the same form at the same time (CVE-2014-2983).\n\nMultiple security issues in Drupal before 7.29, including a denial of\nservice issue, an access bypass issue in the File module, and multiple\ncross-site scripting issues (CVE-2014-5019, CVE-2014-5020,\nCVE-2014-5021, CVE-2014-5022).\n\nA denial of service issue exists in Drupal before 7.31, due to XML\nentity expansion in a publicly accessible XML-RPC endpoint.\n\nA SQL Injection issue exists in Drupal before 7.32 due to the way the\nDrupal core handles prepared statements. A malicious user can inject\narbitrary SQL queries, and thereby completely control the Drupal site.\nThis vulnerability can be exploited by remote attackers without any\nkind of authentication required (CVE-2014-3704).\n\nAaron Averill discovered that a specially crafted request can give a\nuser access to another user's session, allowing an attacker to hijack\na random session (CVE-2014-9015).\n\nMichael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that\nthe password hashing API allows an attacker to send specially crafted\nrequests resulting in CPU and memory exhaustion. This may lead to the\nsite becoming unavailable or unresponsive (denial of service)\n(CVE-2014-9016). anonymous users (CVE-2014-9016).\n\nPassword reset URLs can be forged under certain circumstances,\nallowing an attacker to gain access to another user's account without\nknowing the account's password (CVE-2015-2559).\n\nUnder certain circumstances, malicious users can construct a URL that\nwill trick users into being redirected to a 3rd party website, thereby\nexposing the users to potential social engineering attacks. In\naddition, several URL-related API functions in Drupal 6 and 7 can be\ntricked into passing through external URLs when not intending to,\npotentially leading to additional open redirect vulnerabilities\n(CVE-2015-2749, CVE-2015-2750).\n\nThe drupal package has been updated to version 7.35 to fix this issue\nand other bugs. See the upstream advisory and release notes for more\ndetails.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0322.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0329.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0423.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0492.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2015-0121.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"d2_elliot_name\", value:\"Drupal core 7.x SQL Injection\");\n script_set_attribute(attribute:\"exploit_framework_d2_elliot\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Drupal HTTP Parameter Key/Value SQL Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:drupal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:drupal-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:drupal-postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:drupal-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", reference:\"drupal-7.35-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", reference:\"drupal-mysql-7.35-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", reference:\"drupal-postgresql-7.35-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", reference:\"drupal-sqlite-7.35-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:51", "bulletinFamily": "software", "cvelist": ["CVE-2014-2983"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-2913-1 security@debian.org\r\nhttp://www.debian.org/security/ Salvatore Bonaccorso\r\nApril 25, 2014 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : drupal7\r\nCVE ID : CVE-2014-2983\r\n\r\nAn information disclosure vulnerability was discovered in Drupal, a\r\nfully-featured content management framework. When pages are cached for\r\nanonymous users, form state may leak between anonymous users. Sensitive\r\nor private information recorded for one anonymous user could thus be\r\ndisclosed to other users interacting with the same form at the same\r\ntime.\r\n\r\nThis security update introduces small API changes, see the upstream\r\nadvisory at https://drupal.org/SA-CORE-2014-002 for further information.\r\n\r\nFor the stable distribution (wheezy), this problem has been fixed in\r\nversion 7.14-2+deb7u4.\r\n\r\nFor the testing distribution (jessie), this problem has been fixed in\r\nversion 7.27-1.\r\n\r\nFor the unstable distribution (sid), this problem has been fixed in\r\nversion 7.27-1.\r\n\r\nWe recommend that you upgrade your drupal7 packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: http://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n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\r\nlYsr0BeDNSniXKQ/VGue\r\n=d/kF\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-05-04T00:00:00", "published": "2014-05-04T00:00:00", "id": "SECURITYVULNS:DOC:30557", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30557", "title": "[SECURITY] [DSA 2913-1] drupal7 security update", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:51", "bulletinFamily": "software", "cvelist": ["CVE-2014-2983"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-2914-1 security@debian.org\r\nhttp://www.debian.org/security/ Salvatore Bonaccorso\r\nApril 25, 2014 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : drupal6\r\nCVE ID : CVE-2014-2983\r\n\r\nAn information disclosure vulnerability was discovered in Drupal, a\r\nfully-featured content management framework. When pages are cached for\r\nanonymous users, form state may leak between anonymous users. Sensitive\r\nor private information recorded for one anonymous user could thus be\r\ndisclosed to other users interacting with the same form at the same\r\ntime.\r\n\r\nThis security update introduces small API changes, see the upstream\r\nadvisory at https://drupal.org/SA-CORE-2014-002 for further information.\r\n\r\nFor the oldstable distribution (squeeze), this problem has been fixed in\r\nversion 6.31-1.\r\n\r\nWe recommend that you upgrade your drupal6 packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: http://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n\r\niQIcBAEBCgAGBQJTWsKuAAoJEAVMuPMTQ89E1hUP/RgYcJW/SmmetZOm8zTGT4Ky\r\nMoMWmXqVha0GAQ+H92YN+VMgN3PH3hiSoj3efsV90IrbL1YFLq4PEHJDZkqkqzfa\r\nZ13P9hdirqSLNboFFG2mMleqzYFzwnb/eZlq2gDOvClDuPlnUh5k9tr+K784vT39\r\nSSgeE43BurSqSI7BL3dUaNkmxbh/J8Uy7nza/uqfHgmD8RmhLedtppq7XHzpTlOV\r\nNM30uKJakVdIcNeNAvY9D1oqmhyOJq1X3LUO6w6bQIJEbxa0ptKBUm4Q2HgEa5yK\r\naxWpbd3tj3oWiGlugx041DFPBbHsCCsnZWpHFEpHblPM2dU6x9Om7HUQIvj/KW4W\r\nO+04U0WiKEXcqZjFermI4ge3LYl5+1gSZS5S31SLDd9t2IZ4TGeJG47qLESyD/iy\r\nXyS0wwO8uKIxg6yf8DhaiClWTgj3mBarG4AQ3UjC21Mhpcpt8DMBlTSWFfumhMkp\r\nR3nY6FlROgXISjuTXpK0hFaIMYWbRHfwF5Sb5/8Bhptloptxd7aDci4rvsK921KN\r\nGNKxHp1RccKyr57cGsru8vEMYUQoSaTdJpqKElg8dTKJ2BNh9bUhs6HzlL3d2sq6\r\nbZuTk28QNhrYrhvnSNhsze1izXE6Tfc2EiIk39MwkJrlMMIejPJ+7UOvcRllazMU\r\nOo0mTSnjqwyxkWTZkqGz\r\n=8tx1\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-05-04T00:00:00", "published": "2014-05-04T00:00:00", "id": "SECURITYVULNS:DOC:30558", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30558", "title": "[SECURITY] [DSA 2914-1] drupal6 security update", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:59", "bulletinFamily": "software", "cvelist": ["CVE-2015-2750", "CVE-2014-9015", "CVE-2015-2749", "CVE-2014-5020", "CVE-2014-5021", "CVE-2014-2983", "CVE-2014-3704", "CVE-2014-5019", "CVE-2015-2559", "CVE-2014-5022", "CVE-2014-9016"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2015:181\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : drupal\r\n Date : March 30, 2015\r\n Affected: Business Server 1.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Updated drupal packages fix security vulnerabilities:\r\n \r\n An information disclosure vulnerability was discovered in Drupal\r\n before 7.27. When pages are cached for anonymous users, form state\r\n may leak between anonymous users. Sensitive or private information\r\n recorded for one anonymous user could thus be disclosed to other\r\n users interacting with the same form at the same time (CVE-2014-2983).\r\n \r\n Multiple security issues in Drupal before 7.29, including a denial\r\n of service issue, an access bypass issue in the File module, and\r\n multiple cross-site scripting issues (CVE-2014-5019, CVE-2014-5020,\r\n CVE-2014-5021, CVE-2014-5022).\r\n \r\n A denial of service issue exists in Drupal before 7.31, due to XML\r\n entity expansion in a publicly accessible XML-RPC endpoint.\r\n \r\n An SQL Injection issue exists in Drupal before 7.32 due to the way\r\n the Drupal core handles prepared statements. A malicious user can\r\n inject arbitrary SQL queries, and thereby completely control the\r\n Drupal site. This vulnerability can be exploited by remote attackers\r\n without any kind of authentication required (CVE-2014-3704).\r\n \r\n Aaron Averill discovered that a specially crafted request can give a\r\n user access to another user's session, allowing an attacker to hijack\r\n a random session (CVE-2014-9015).\r\n \r\n Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered\r\n that the password hashing API allows an attacker to send specially\r\n crafted requests resulting in CPU and memory exhaustion. This may lead\r\n to the site becoming unavailable or unresponsive (denial of service)\r\n (CVE-2014-9016). anonymous users (CVE-2014-9016).\r\n \r\n Password reset URLs can be forged under certain circumstances, allowing\r\n an attacker to gain access to another user's account without knowing\r\n the account's password (CVE-2015-2559).\r\n \r\n Under certain circumstances, malicious users can construct a URL\r\n that will trick users into being redirected to a 3rd party website,\r\n thereby exposing the users to potential social engineering attacks. In\r\n addition, several URL-related API functions in Drupal 6 and 7 can be\r\n tricked into passing through external URLs when not intending to,\r\n potentially leading to additional open redirect vulnerabilities\r\n (CVE-2015-2749, CVE-2015-2750).\r\n \r\n The drupal package has been updated to version 7.35 to fix this\r\n issue and other bugs. See the upstream advisory and release notes\r\n for more details.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2983\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3704\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5019\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5020\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5021\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5022\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9015\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9016\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2559\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2749\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2750\r\n http://advisories.mageia.org/MGASA-2014-0322.html\r\n http://advisories.mageia.org/MGASA-2014-0329.html\r\n http://advisories.mageia.org/MGASA-2014-0423.html\r\n http://advisories.mageia.org/MGASA-2014-0492.html\r\n http://advisories.mageia.org/MGASA-2015-0121.html\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Business Server 1/X86_64:\r\n 8181a2b7b02a918304059853aa485f98 mbs1/x86_64/drupal-7.35-1.mbs1.noarch.rpm\r\n 68e0c245147c7044c5ea3c55a0d3951a mbs1/x86_64/drupal-mysql-7.35-1.mbs1.noarch.rpm\r\n bde1b563b01f56120c032086167239a4 mbs1/x86_64/drupal-postgresql-7.35-1.mbs1.noarch.rpm\r\n 2e9f67e53b0472ae175b9853a05c7af2 mbs1/x86_64/drupal-sqlite-7.35-1.mbs1.noarch.rpm \r\n f9519474702357f27e4bb03557064d9d mbs1/SRPMS/drupal-7.35-1.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFVGTXBmqjQ0CJFipgRAuMOAJ9CQl8dyrZJuFJWL9Y/MI9x3IcHtQCfc/s3\r\n7fYwyk+8ldbJhjqKI46bLHk=\r\n=3jEr\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2015-05-12T00:00:00", "published": "2015-05-12T00:00:00", "id": "SECURITYVULNS:DOC:32107", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32107", "title": "[ MDVSA-2015:181 ] drupal", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:55", "bulletinFamily": "software", "cvelist": ["CVE-2014-2540", "CVE-2014-1854", "CVE-2014-2729", "CVE-2014-2654", "CVE-2014-2579", "CVE-2014-2736", "CVE-2014-0111", "CVE-2014-2042", "CVE-2014-1907", "CVE-2013-2251", "CVE-2014-2219", "CVE-2014-2340", "CVE-2014-1217", "CVE-2014-1906", "CVE-2014-2737", "CVE-2014-1946", "CVE-2014-1905", "CVE-2014-2983", "CVE-2013-2187", "CVE-2014-2875", "CVE-2014-2383", "CVE-2014-0166", "CVE-2014-1945", "CVE-2014-2024", "CVE-2014-1908", "CVE-2014-1517", "CVE-2014-2715", "CVE-2014-0472", "CVE-2014-1944"], "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 1, "modified": "2014-05-04T00:00:00", "published": "2014-05-04T00:00:00", "id": "SECURITYVULNS:VULN:13714", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13714", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:00", "bulletinFamily": "software", "cvelist": ["CVE-2015-2750", "CVE-2015-2172", "CVE-2015-0225", "CVE-2014-9258", "CVE-2015-2843", "CVE-2015-0845", "CVE-2015-2845", "CVE-2014-2027", "CVE-2014-8764", "CVE-2015-2844", "CVE-2014-8360", "CVE-2014-2685", "CVE-2014-5361", "CVE-2014-8762", "CVE-2015-2206", "CVE-2015-2934", "CVE-2014-8761", "CVE-2015-2938", "CVE-2015-2749", "CVE-2014-8763", "CVE-2015-2933", "CVE-2014-5020", "CVE-2015-2939", "CVE-2014-2682", "CVE-2014-5021", "CVE-2015-2940", "CVE-2014-2983", "CVE-2014-3704", "CVE-2015-2781", "CVE-2014-9253", "CVE-2015-2842", "CVE-2014-8089", "CVE-2015-2690", "CVE-2015-2932", "CVE-2015-2937", "CVE-2014-5019", "CVE-2015-1773", "CVE-2015-2559", "CVE-2014-5022", "CVE-2015-2931", "CVE-2014-2684", "CVE-2014-4914", "CVE-2014-5362", "CVE-2014-5032", "CVE-2015-2936", "CVE-2015-2935", "CVE-2014-2683", "CVE-2014-2681", "CVE-2015-2560"], "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 1, "modified": "2015-05-12T00:00:00", "published": "2015-05-12T00:00:00", "id": "SECURITYVULNS:VULN:14479", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14479", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "drupal": [{"lastseen": "2020-12-31T21:46:49", "bulletinFamily": "software", "cvelist": ["CVE-2014-2983"], "description": "Drupal's form API has built-in support for temporary storage of form state, for example user input. This is often used on multi-step forms, and is required on Ajax-enabled forms in order to allow the Ajax calls to access and update interim user input on the server.\n\nWhen pages are cached for anonymous users (either by Drupal or by an external system), form state may leak between anonymous users. As a consequence there is a chance that interim form input recorded for one anonymous user (which may include sensitive or private information, depending on the nature of the form) will be disclosed to other users interacting with the same form at the same time. This especially affects multi-step Ajax forms because the window of opportunity (i.e. the time span between user input and final form submission) is indeterminable.\n\nThis vulnerability is mitigated by the fact that Drupal core does not expose any such forms to anonymous users by default. However, contributed modules or individual sites which leverage the Drupal Form API under the aforementioned conditions might be vulnerable.\n\n**Note:** This security release introduces small API changes which may require code updates on sites that expose Ajax or multi-step forms to anonymous users, and where the forms are displayed on pages that are cached (either by Drupal or by an external system). See the [Drupal 6.31 release notes](<http://drupal.org/drupal-6.31-release-notes>) and [Drupal 7.27 release notes](<http://drupal.org/drupal-7.27-release-notes>) for more information.\n\n## CVE identifier(s) issued\n\n * CVE-2014-2983\n\n## Versions affected\n\n * Drupal core 6.x versions prior to 6.31.\n * Drupal core 7.x versions prior to 7.27.\n\n## Solution\n\nInstall the latest version:\n\n * If you use Drupal 6.x, upgrade to [Drupal 6.31](<https://drupal.org/drupal-6.31-release-notes>)\n * If you use Drupal 7.x, upgrade to [Drupal 7.27](<https://drupal.org/drupal-7.27-release-notes>)\n\nAlso see the [Drupal core](<http://drupal.org/project/drupal>) project page.\n\n## Reported by\n\n * [Daniel F. Kudwien](<https://drupal.org/user/54136>)\n * [Rodionov Igor](<https://drupal.org/user/234004>)\n * [Ryan Szrama](<https://drupal.org/user/49344>)\n * [Roman Zimmermann](<https://drupal.org/user/865256>)\n * [znerol](<https://drupal.org/user/63999>)\n\n## Fixed by\n\n * [znerol](<https://drupal.org/user/63999>)\n * [Roman Zimmermann](<https://drupal.org/user/865256>)\n * [Ryan Szrama](<https://drupal.org/user/49344>)\n * Additional assistance and reviews provided by [Daniel F. Kudwien](<https://drupal.org/user/54136>), [Damien Tournoud](<https://drupal.org/user/22211>) of the Drupal Security Team, [David Rothstein](<http://drupal.org/user/124982>) of the Drupal Security Team, and [Alex Bronstein](<https://drupal.org/user/78040>)\n\n## Coordinated by\n\n * [Michael Hess](<http://drupal.org/user/102818>) of the Drupal Security Team\n * [David Rothstein](<http://drupal.org/user/124982>) of the Drupal Security Team\n * [Peter Wolanin](<http://drupal.org/user/49851>) of the Drupal Security Team\n", "modified": "2014-04-16T00:00:00", "published": "2014-04-16T00:00:00", "id": "DRUPAL-SA-CORE-2014-002", "href": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-04-16/sa-core-2014-002-drupal-core", "type": "drupal", "title": "SA-CORE-2014-002 - Drupal core - Information Disclosure\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}]}