drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in drupal7
Name: |
Mangelnde Rechteprüfung in drupal7 |
|
ID: |
FEDORA-2011-8878 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 15 |
|
Datum: |
Sa, 16. Juli 2011, 19:07 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2687 |
|
Applikationen: |
Drupal |
|
Originalnachricht |
Name : drupal7 Product : Fedora 15 Version : 7.4 Release : 1.fc15 URL : http://www.drupal.org Summary : An open-source content-management platform Description : Equipped with a powerful blend of features, Drupal is a Content Management System written in PHP that can support a variety of websites ranging from personal weblogs to large community-driven websites. Drupal is highly configurable, skinnable, and secure.
------------------------------------------------------------------------------- - Update Information:
Remember to log in as user 1 prior to the RPM update, to perform the DB upgrade via http://yoursite/update.php.
* Advisory ID: DRUPAL-SA-CORE-2011-002 * Project: Drupal core [1] * Version: 7.x * Date: 2011-JUNE-29 * Security risk: Highly critical [2] * Exploitable from: Remote * Vulnerability: Access bypass
-------- DESCRIPTION ---------------------------------------------------------
.... Access bypass in node listings
Listings showing nodes but not JOINing the node table show all nodes regardless of restrictions imposed by the node_access system. In core, this affects the taxonomy and the forum subsystem.
Note that fixing this issue in contributed modules requires a backwards-compatible API change for modules listing nodes. See http://drupal.org/node/1204572 [3] for more details.
This issue affects Drupal 7.x only.
-------- VERSIONS AFFECTED ---------------------------------------------------
* Drupal 7.0, 7.1 and 7.2.
-------- SOLUTION ------------------------------------------------------------
Install the latest version:
* If you are running Drupal 7.x then upgrade to Drupal 7.3 or 7.4.
The Security Team has released both a pure security update without other bug fixes and a security update combined with other bug fixes and improvements. You can choose to either only include the security update for an immediate fix (which might require less quality assurance and testing) or more fixes and improvements alongside the security fixes by choosing between Drupal 7.3 and Drupal 7.4. Read the announcement [4] for more information.
See also the Drupal core [5] project page.
-------- REPORTED BY ---------------------------------------------------------
* The access bypass was reported independently by numerous people, including Sascha Grossenbacher [6], Khaled Alhourani [7], and Ben Ford [8].
-------- FIXED BY ------------------------------------------------------------
* The access bypass was fixed by Károly Négyesi [9], member of the Drupal security team
-------- CONTACT AND MORE INFORMATION ----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing secure code for Drupal [12], and securing your site [13].
[1] http://drupal.org/project/drupal [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/node/1204572 [4] http://drupal.org/drupal-7.4 [5] http://drupal.org/project/drupal [6] http://drupal.org/user/214652 [7] http://drupal.org/user/265439 [8] http://drupal.org/user/12534 [9] http://drupal.org/user/9446 [10] http://drupal.org/contact [11] http://drupal.org/security-team [12] http://drupal.org/writing-secure-code [13] http://drupal.org/security/secure-configuration
------------------------------------------------------------------------------- - ChangeLog:
* Thu Jun 30 2011 Jon Ciesla <limb@jcomserv.net> - 7.4-1 - New upstream, SA-CORE-2011-002, BZ 717874. - Dropped unused dirs in /etc/drupal7/, BZ 703736. * Fri Jun 17 2011 Jon Ciesla <limb@jcomserv.net> - 7.2-2 - Bump and rebuild for BZ 712251. * Thu May 26 2011 Jon Ciesla <limb@jcomserv.net> - 7.2-1 - New upstream, SA-CORE-2011-001. ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #717874 - CVE-2011-2687 Remote access bypass vulnerability in Drupal 7 https://bugzilla.redhat.com/show_bug.cgi?id=717874 [ 2 ] Bug #706736 - Put modules and themes directories under /etc/drupal7/all/ https://bugzilla.redhat.com/show_bug.cgi?id=706736 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update drupal7' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|