Drupal Third-Party Modules Multiple Vulnerabilities


Description   (#Several vulnerabilities have been identified in Drupal third-party modules:#- CMS Updater: access bypass due to insufficient protection in the settings page. An remote attacker with "access administration pages" permission on the site could exploit it in order to change settings of the module##- CMS Updater: cross-site scripting due to insufficient sanitation of user provided text on the configuration page. A remote attacker can exploit it in order to execute arbitrary JavaScript or HTML##- amoCRM: cross-site scripting due to insufficient sanitation of logged data when malicious POST data is received. A remote attacker can exploit it in order to execute arbitrary JavaScript or HTML code. A module such as "Database logging" (dblog) must be enabled in order to display log messages in a HTML context##- Drupal 7 driver for SQL Server and SQL Azure: SQL injection due to improper escape of certain characters by the Drupal database API. A remote attacker can exploit it in order to to access restricted information by performing a specially-crafted search##- Scald: information disclosure due to the non-application of the restrictions on the fields attached to a given atom property in the "debug" context. Only sites that added fields to an atom type and then restricted access to those fields are vulnerable.)
     
Vulnerable Products   Vulnerable Software:
Drupal (Drupal) - 7.0, 7.1, 7.10, 7.11, 7.12, ..., 7.5, 7.6, 7.7, 7.8, 7.9
     
Solution   - Scald: 7.x-1.5.
     
CVE  
     
References   - SA-CONTRIB-2015-151: Scald Information Disclosure
https://www.drupal.org/node/2569631
- SA-CONTRIB-2015-150: CMS Updater Multiple vulnerabilities
https://www.drupal.org/node/2569599
- SA-CONTRIB-2015-148: Drupal 7 driver for SQL Server and SQL Azure SQL Injection
https://www.drupal.org/node/2569577
- SA-CONTRIB-2015-149: amoCRM Cross Site Scripting
https://www.drupal.org/node/2569587
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-09-16 

 Target Type 
Server 

 Possible exploit 
Remote