U radu programskog paketa Drupal 7 uočen je sigurnosni propust kojeg udaljeni napadač može iskoristiti za dobivanje većih privilegija u sustavu i otkrivanje osjetljivih informacija.
Paket:
drupal 7.x
Operacijski sustavi:
Fedora 14, Fedora 15
Problem:
nepravilno rukovanje ovlastima
Iskorištavanje:
udaljeno
Posljedica:
dobivanje većih privilegija, otkrivanje osjetljivih informacija
Rješenje:
programska zakrpa proizvođača
Izvorni ID preporuke:
FEDORA-2011-9893
Izvor:
Fedora
Problem:
Sigurnosna ranjivost je posljedica nepravilnog rukovanja ovlastima zbog čega čvor dijete može imati veće ovlasti od roditeljskog čvora.
Posljedica:
Udaljeni napadač ranjivost može iskoristiti za dobivanje većih privilegija u sustavu i otkrivanje osjetljivih podataka.
Rješenje:
Kao rješenje opisanog problema navodi se preuzimanje i uporaba osvježenih inačica paketa.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-9893
2011-07-31 03:00:17
--------------------------------------------------------------------------------
Name : drupal7
Product : Fedora 14
Version : 7.6
Release : 1.fc14
URL : http://www.drupal.org
Summary : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites. Drupal is highly
configurable, skinnable, and secure.
--------------------------------------------------------------------------------
Update Information:
Remember to log in as the admin user prior to RPM upgrade to perform DB
upgrade.
* Advisory ID: DRUPAL-SA-CORE-2011-003
* Project: Drupal core [1]
* Version: 7.x
* Date: 2011-July-27
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
.... Access bypass in private file fields on comments.
Drupal 7 contains two new features: the ability to attach File upload fields
to any entity type in the system and the ability to point individual File
upload fields to the private file directory.
If a Drupal site is using these features on comments, and the parent node is
denied access (either by a node access module or by being unpublished), the
file attached to the comment can still be downloaded by non-privileged users
if they know or guess its direct URL.
This issue affects Drupal 7.x only.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Drupal 7.x before version 7.5.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you are running Drupal 7.x then upgrade to Drupal 7.5 or 7.6.
The Security Team has released both a pure security update without other bug
fixes and a security update combined with other bug fixes and improvements.
You can choose to either only include the security update for an immediate
fix (which might require less quality assurance and testing) or more fixes
and improvements alongside the security fixes by choosing between Drupal 7.5
and Drupal 7.6. Read the announcement [3] for more information.
See also the Drupal core [4] project page.
-------- REPORTED BY
---------------------------------------------------------
* The File access bypass was reported by Florian Weber [5].
-------- FIXED BY
------------------------------------------------------------
* The File access bypass was fixed by StÄ
Posljednje sigurnosne preporuke