SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   Drupal Vendors:   drupal.org
Drupal Multiple Flaws Let Remote Users Access and Modify Data and Cause Arbitrary Code to be Executed
SecurityTracker Alert ID:  1041912
SecurityTracker URL:  http://securitytracker.com/id/1041912
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Oct 18 2018
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in Drupal. A remote user can access data on the target system. A remote user can modify data on the target system. A remote user can cause arbitrary code to be executed on the target system.

A remote authenticated user can supply specially crafted for certain transitions to bypass content moderation. Version 8 is affected.

A remote authenticated user with administer paths permission can enter a path to cause an open redirect to a third party url.

A remote user can cause the target user's link to be redirected to a new destination. Version 8 is affected.

A remote user can cause arbitrary code to be executed on the target system via DefaultMailSystem::mail().

A remote user with access contextual links permissions can bypass contextual links validation. Version 8 is affected.

Roland Kovacsics, attilatilman, dyates, Brian Osborne, Damien Tournoud, and Nick Booher reported these vulnerabilities.

Impact:   A remote user can obtain data on the target system.

A remote user can modify data on the target system.

A remote user can execute arbitrary code on the target system.

Solution:   The vendor has issued a fix (7.60, 8.5.8, 8.6.2).

The vendor advisory is available at:

https://www.drupal.org/sa-core-2018-006

Vendor URL:  www.drupal.org/sa-core-2018-006 (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC