Description
|
|
Multiple vulnerabilities have been identified in Drupal, which could be exploited to gain knowledge of sensitive information, or conduct cross site scripting, SQL Injection and HTTP response splitting attacks.
The first issue is caused by unspecified input validation errors when processing user-supplied data, which could be exploited by attackers to inject arbitrary HTTP headers.
The second vulnerability is caused by an input validation error in the Upload module when displaying ".html" files, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The third issue is caused by an error in the "comment_save()" function within the Comments module where the publication status of comments is not passed during the "hook_comments" API operation, which could cause various modules that rely on the publication status (e.g. Organic groups or Subscriptions) to send emails containing unpublished comments.
The fourth issue is caused by an input validation error in the "install.php" script, which could be exploited to conduct SQL Injection attacks.
The fifth issue is caused by an error when handling HTTP requests, which could be exploited to conduct cross-site request forgery attacks.
|