Summary: | www-apps/drupal <5.17/6.11 Cross-Site Scripting Vulnerability (CVE-2009-{1575,1576}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Baptiste aka mRyOuNg <mryoung> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | web-apps |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://drupal.org/node/449078 | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Baptiste aka mRyOuNg
2009-04-30 20:03:20 UTC
Thank you for report, mRyOuNg. drupal 6.11 and 5.17 were added to the tree. Peter, please consider removing the vulnerable versions in the near future. ~arch -> noglsa. Thanks everyone. CVE-2009-1575 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1575): Cross-site scripting (XSS) vulnerability in Drupal 5.x before 5.17 and 6.x before 6.11, as used in vbDrupal before 5.17.0, allows remote attackers to inject arbitrary web script or HTML via crafted UTF-8 byte sequences before the Content-Type meta tag, which are treated as UTF-7 by Internet Explorer 6 and 7. CVE-2009-1576 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1576): Unspecified vulnerability in Drupal 5.x before 5.17 and 6.x before 6.11, as used in vbDrupal before 5.17.0, allows user-assisted remote attackers to obtain sensitive information by tricking victims into visiting the front page of the site with a crafted URL and causing form data to be sent to an attacker-controlled site, possibly related to multiple / (slash) characters that are not properly handled by includes/bootstrap.inc, as demonstrated using the search box. NOTE: this vulnerability can be leveraged to conduct cross-site request forgery (CSRF) attacks. |