Drupal Core Multiple Vulnerabilities Fixed by 6.37 and 7.39


Description   Several vulnerabilities have been identified in Drupal's core:
- cross-site scripting. A remote attacker can exploit it by invoking "Drupal.ajax()" function on a white-listed HTML element
- CVE-2015-6658 : cross-site scripting. A remote attacker can exploit it via the requested URL that performs autocomplete functionality
- CVE-2015-6659 : SQL injection. A remote attacker with elevated permissions can exploit it by injecting malicious requests in SQL comments
- CVE-2015-6660 : cross-site request forgery. A remote attacker can exploit it via form API in order to upload temporary file under another user's account. This vulnerability stems in the fact that form token validation is not performed early enough
- CVE-2015-6661 : information disclosure. A remote attacker without "access content" permission can see the titles of nodes that they do not have access to, if the nodes are added to a menu on the site that the attacker have access to
Updated, 22/08/2015:
The drupal6 and drupal7 packages provided by FreeBSD are vulnerable.
Updated, 27/08/2015:
The drupal6 packages provided by Debian Squeeze 6 are vulnerable (CVE-2015-6658, CVE-2015-6660).
The drupal7 packages provided by Debian Wheezy 7 and Jessie 8 are vulnerable.
Updated, 28/08/2015:
CVE-2015-6665 has been attributed to cross-site scripting vulnerability relative to Drupal.ajax() function.
     
Vulnerable Products   Vulnerable OS:
Fedora (Red Hat) - 21, 22FreeBSD (FreeBSD)GNU/Linux (Debian) - 6, 7, 8Vulnerable Software:
Drupal (Drupal) - 6.0, 6.1, 6.10, 6.11, 6.12, ..., 7.5, 7.6, 7.7, 7.8, 7.9
     
Solution   Fixed drupal7 packages for Fedora 21 and 22 are available.
     
CVE   CVE-2015-6665
CVE-2015-6661
CVE-2015-6660
CVE-2015-6659
CVE-2015-6658
     
References   - Drupal SA-CORE-2015-003 : Critical
Multiple Vulnerabilities
https://www.drupal.org/SA-CORE-2015-003
- VuXML : drupal -- multiple vulnerabilities
http://www.vuxml.org/freebsd/9393213d-489b-11e5-b8c7-d050996490d0.html
- Debian Security Tracker : drupal6 and drupal7
https://security-tracker.debian.org/tracker/CVE-2015-6658
https://security-tracker.debian.org/tracker/CVE-2015-6659
https://security-tracker.debian.org/tracker/CVE-2015-6660
https://security-tracker.debian.org/tracker/CVE-2015-6661
https://security-tracker.debian.org/tracker/CVE-2015-6665
- DSA 3346-1 : drupal7 security update
https://lists.debian.org/debian-security-announce/2015/msg00245.html
- FEDORA-2015-13917 : Fedora 21 Update: drupal7-7.39-1.fc21
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html
FEDORA-2015-13917 : Fedora 22 Update: drupal7-7.39-1.fc22
https://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-08-19 

 Target Type 
Server 

 Possible exploit 
Remote