Pri radu sustava za upravljanje sadržajem (eng. CMS) Drupal otkrivena je ranjivost koja omogućuje udaljenom napadaču neautoriziran pristup sustavu.
Paket:
drupal 7.x
Operacijski sustavi:
Fedora 14, Fedora 15
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
neovlašteni pristup sustavu, zaobilaženje postavljenih ograničenja
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-2687
Izvorni ID preporuke:
FEDORA-2011-8878
Izvor:
Fedora
Problem:
Uočeni propust vezan je uz popis čvorova koji nije povezan s tablicom čvorova. Naime, taj popis prikazuje sve čvorove bez obzira na postavljena ograničenja sustava za pristup čvoru. Propust utječe na funkcioniranje taksonomije i forumskog podsustava.
Posljedica:
Napadač može iskoristiti nedostatak za obilaženje postavljenih sigurnosnih ograničenja.
Rješenje:
Kao rješenje problema svim korisnicima preporučuje se instalacija najnovije inačice alata. Također, korisnicima se savjetuje instalacija globalnih modula i tema u /etc/drupal7/all direktorij umjesto dosadašnjeg pogrešnog instaliranja u direktorij /etc/drupal7.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-8878
2011-06-30 18:37:03
--------------------------------------------------------------------------------
Name : drupal7
Product : Fedora 15
Version : 7.4
Release : 1.fc15
URL : http://www.drupal.org
Summary : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites. Drupal is highly
configurable, skinnable, and secure.
--------------------------------------------------------------------------------
Update Information:
Remember to log in as user 1 prior to the RPM update, to perform the DB upgrade
via http://yoursite/update.php.
* Advisory ID: DRUPAL-SA-CORE-2011-002
* Project: Drupal core [1]
* Version: 7.x
* Date: 2011-JUNE-29
* Security risk: Highly critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
.... Access bypass in node listings
Listings showing nodes but not JOINing the node table show all nodes
regardless of restrictions imposed by the node_access system. In core, this
affects the taxonomy and the forum subsystem.
Note that fixing this issue in contributed modules requires a
backwards-compatible API change for modules listing nodes. See
http://drupal.org/node/1204572 [3] for more details.
This issue affects Drupal 7.x only.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Drupal 7.0, 7.1 and 7.2.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you are running Drupal 7.x then upgrade to Drupal 7.3 or 7.4.
The Security Team has released both a pure security update without other bug
fixes and a security update combined with other bug fixes and improvements.
You can choose to either only include the security update for an immediate
fix (which might require less quality assurance and testing) or more fixes
and improvements alongside the security fixes by choosing between Drupal 7.3
and Drupal 7.4. Read the announcement [4] for more information.
See also the Drupal core [5] project page.
-------- REPORTED BY
---------------------------------------------------------
* The access bypass was reported independently by numerous people, including
Sascha Grossenbacher [6], Khaled Alhourani [7], and Ben Ford [8].
-------- FIXED BY
------------------------------------------------------------
* The access bypass was fixed by KÄ
Posljednje sigurnosne preporuke