[SA23887] Drupal Project Issue Tracking Module Multiple Vulnerabilities

2007-01-25T00:00:00
ID SECURITYVULNS:DOC:15867
Type securityvulns
Reporter Securityvulns
Modified 2007-01-25T00:00:00

Description

TITLE: Drupal Project Issue Tracking Module Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA23887

VERIFY ADVISORY: http://secunia.com/advisories/23887/

CRITICAL: Less critical

IMPACT: Security Bypass, Cross Site Scripting, Manipulation of data, Exposure of sensitive information, System access

WHERE: >From remote

SOFTWARE: Drupal Project issue tracking Module 4.x http://secunia.com/product/12913/

DESCRIPTION: Some vulnerabilities have been reported in the Project issue tracking module for Drupal, which can be exploited by malicious users to bypass certain security restrictions, disclose sensitive information, manipulate data, compromise vulnerable systems or conduct script insertion attacks.

1) An unspecified error in assembling permissions causes users to get full access to all issues.

Successful exploitation requires valid user credentials and that the user has the "Access project issues" permission.

2) An unspecified error in assembling permissions causes users to be able to download confidential or private files.

Successful exploitation requires valid user credentials, that the user has the "Access project issues" permission, that the site is configured to use the private download method, and that the user can guess the filenames.

3) An unspecified script fails to validate the extension(s) of an uploaded file. This can be exploited to upload files with arbitrary extensions (e.g. ".php" or ".php.pps") and execute arbitrary PHP code on the server.

Successful exploitation requires valid user credentials, that the user has the "Create project issues" permission, and that the Apache server configuration disables "FileInfo" overrides in .htaccess files.

4) For more information: SA23908

The vulnerabilities are reported in version 4.7.x-2.1, 4.7.x-1.1, 4.7.0 (from before the new release system) and in 4.6.x (when the product was a part of the Project module).

SOLUTION: Update to version 4.7.x-2.2 or 4.7.x-1.2.

PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1+2) Derek Wright a.k.a dww 3) Heine Deelstra 4) Brandon Bergren a.k.a bdragon

ORIGINAL ADVISORY: DRUPAL-SA-2007-004: http://drupal.org/node/112146

OTHER REFERENCES: SA23908: http://secunia.com/advisories/23908/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.