--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2009-1014
2009-12-17 23:17:16
--------------------------------------------------------------------------------
Name : drupal
Product : Fedora EPEL 5
Version : 5.21
Release : 1.el5
URL :
http://www.drupal.org
Summary : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites. Drupal is highly
configurable, skinnable, and secure.
--------------------------------------------------------------------------------
Update Information:
* Advisory ID: DRUPAL-SA-CORE-2009-009 * Project: Drupal core * Version:
5.x, 6.x * Date: 2009-December-16 * Security risk: Not critical *
Exploitable from: Remote * Vulnerability: Cross site scripting --------
DESCRIPTION ---------------------------------------------------------
Multiple vulnerabilities were discovered in Drupal. .... Contact category name
cross-site scripting The Contact module does not correctly handle certain
user input when displaying category information. Users privileged to create
contact categories can insert arbitrary HTML and script code into the contact
module administration page. Such a cross-site scripting attack may lead to the
malicious user gaining administrative access. Wikipedia has more information
about cross-site scripting [1] (XSS). This issue affects Drupal 6.x and Drupal
5.x. .... Menu description cross-site scripting The Menu module does not
correctly handle certain user input when displaying the menu administration
overview. Users privileged to create new menus can insert arbitrary HTML and
script code into the menu module administration page. Such a cross-site
scripting attack may lead to the malicious user gaining administrative access.
Wikipedia has more information about cross-site scripting [2] (XSS). This issue
affects Drupal 6.x only. -------- VERSIONS AFFECTED
--------------------------------------------------- * Drupal 5.x before
version 5.21. * Drupal 6.x before version 6.15. -------- SOLUTION
------------------------------------------------------------ Install the
latest version: * If you are running Drupal 6.x then upgrade to Drupal 6.15
[3]. * If you are running Drupal 5.x then upgrade to Drupal 5.21 [4]. If
you are unable to upgrade immediately, you can apply a patch to secure your
installation until you are able to do a proper upgrade. Theses patches fix the
security vulnerability, but do not contain other fixes which were released in
Drupal 5.21 or Drupal 6.15. * To patch Drupal 6.14 use SA-
CORE-2009-009-6.14.patch [5]. * To patch Drupal 5.20 use SA-
CORE-2009-009-5.20.patch [6]. -------- REPORTED BY
--------------------------------------------------------- The contact
category XSS issue was independently reported by mr.baileys and Justin Klein
Keane [7]. The menu description XSS issue was reported by mr.baileys [8].
-------- FIXED BY
------------------------------------------------------------ The contact
category XSS issue was fixed by Justin Klein Keane [9] and Dave Reid [10]. The
menu description XSS issue was fixed by Gábor Hojtsy [11] and Heine Deelstra
[12]. -------- CONTACT
------------------------------------------------------------- The security
team for Drupal can be reached at security at
drupal.org or via the form at
http://drupal.org/contact. [1]
http://en.wikipedia.org/wiki/Cross-
site_scripting [2]
http://en.wikipedia.org/wiki/Cross-site_scripting [3]
http://ftp.drupal.org/files/projects/drupal-6.15.tar.gz [4]
http://ftp.drupal.org/files/projects/drupal-5.21.tar.gz [5]
http://drupal.org/files/sa-core-2009-009/SA-CORE-2009-009-6.14.patch [6]
http://drupal.org/files/sa-core-2009-009/SA-CORE-2009-009-5.20.patch [7]
http://drupal.org/user/302225 [8]
http://drupal.org/user/383424 [9]
http://drupal.org/user/302225 [10]
http://drupal.org/user/53892 [11]
http://drupal.org/user/4166 [12]
http://drupal.org/user/17943
_______________________________________________ Security-news mailing list
Security-news(a)drupal.org
http://lists.drupal.org/mailman/listinfo/security-news
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update drupal' at the command line.
For more information, refer to "Managing Software with yum",
available at
http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------