A weakness and a vulnerability have been reported in Drupal, which can be exploited by malicious users to conduct spoofing attacks and by malicious people to conduct cross-site scripting attacks.
1) The weakness is caused due to an unspecified error and can be exploited to change the page cache so existing pages return "page not found" errors.
Successful exploitation requires valid user credentials with the ability to post content. It also requires the page cache to be enabled and that MySQL is used.
2) Input passed to unspecified parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The weakness and the vulnerability are reported in the 4.6.x branch before 4.6.11 and in the 4.7.x branch before 4.7.5.
Solution: Update to version 4.6.11 or 4.7.5.
Provided and/or discovered by: 1) Reported by the vendor.
2) The vendor credits an anonymous person via JPCERT.
Original Advisory: DRUPAL-SA-2007-001:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Drupal Unspecified Spoofing Weakness and Cross-Site Scripting
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.