Some vulnerabilities have been reported in the Project issue tracking module for Drupal, which can be exploited by malicious users to bypass certain security restrictions, disclose sensitive information, manipulate data, compromise vulnerable systems or conduct script insertion attacks.
1) An unspecified error in assembling permissions causes users to get full access to all issues.
Successful exploitation requires valid user credentials and that the user has the "Access project issues" permission.
2) An unspecified error in assembling permissions causes users to be able to download confidential or private files.
Successful exploitation requires valid user credentials, that the user has the "Access project issues" permission, that the site is configured to use the private download method, and that the user can guess the filenames.
3) An unspecified script fails to validate the extension(s) of an uploaded file. This can be exploited to upload files with arbitrary extensions (e.g. ".php" or ".php.pps") and execute arbitrary PHP code on the server.
Successful exploitation requires valid user credentials, that the user has the "Create project issues" permission, and that the Apache server configuration disables "FileInfo" overrides in .htaccess files.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org