Daily threat assessment 26FEB2016 (Drupal vulnerabilities)

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4149
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Daily threat assessment 26FEB2016 (Drupal vulnerabilities)

Unread post by mikeshinn »

This report is a daily analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.

Please see this forum post for an explanation of the categories used in this report.

CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: Drupal users are recommended to upgrade due to some less critical vulnerabilities that can not be addressed via WAF.

Already protected against/Known Method/No update required

Infor CRM 8.2.0.1136 - Multiple HTML Script Injection Vulnerabilities
WordPress Ocim MP3 Plugin - SQL Injection Vulnerability
Proxmox VE 3/4 Insecure Hostname Checking Remote Root Exploit (when protected by the ASL WAF)
Dell OpenManage Server Administrator 8.2 Authenticated Vulnerability (When protected bu the ASL WAF)
WordPress plugin wp-ultimate-exporter SQL injection vulnerability
Centreon <= 2.5.3 - Remote Command Execution
HTTP header injection using line breaks (Base system - Drupal 6)
Reflected file download vulnerability (System module - Drupal 6 and 7)

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

Drupal 6 and 7: Saving user accounts can sometimes grant the user all roles
Drupal 7 and 8: Email address can be matched to an account
Drupal 6: Session data truncation can lead to unserialization of user provided data

Rules only users

Summary: Drupal users are recommended to upgrade due to some less critical vulnerabilities that can not be addressed via WAF.

Already protected against/Known Method/No update required


Infor CRM 8.2.0.1136 - Multiple HTML Script Injection Vulnerabilities
WordPress Ocim MP3 Plugin - SQL Injection Vulnerability
Proxmox VE 3/4 Insecure Hostname Checking Remote Root Exploit (when protected by the ASL WAF)
Dell OpenManage Server Administrator 8.2 Authenticated Vulnerability (When protected bu the ASL WAF)
WordPress plugin wp-ultimate-exporter SQL injection vulnerability
Centreon <= 2.5.3 - Remote Command Execution
HTTP header injection using line breaks (Base system - Drupal 6)
Reflected file download vulnerability (System module - Drupal 6 and 7)

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution


Drupal 6 and 7: Saving user accounts can sometimes grant the user all roles
Drupal 7 and 8: Email address can be matched to an account
Drupal 6: Session data truncation can lead to unserialization of user provided data
Post Reply