stable

drupal7-7.6-1.el6

FEDORA-EPEL-2011-3956 created by limb 13 years ago for Fedora EPEL 6

Remember to log in as the admin user prior to RPM upgrade to perform DB upgrade.

  • Advisory ID: DRUPAL-SA-CORE-2011-003
  • Project: Drupal core [1]
  • Version: 7.x
  • Date: 2011-July-27
  • Security risk: Less critical [2]
  • Exploitable from: Remote
  • Vulnerability: Access bypass

-------- DESCRIPTION

.... Access bypass in private file fields on comments.

Drupal 7 contains two new features: the ability to attach File upload fields to any entity type in the system and the ability to point individual File upload fields to the private file directory.

If a Drupal site is using these features on comments, and the parent node is denied access (either by a node access module or by being unpublished), the file attached to the comment can still be downloaded by non-privileged users if they know or guess its direct URL.

This issue affects Drupal 7.x only.

-------- VERSIONS AFFECTED

  • Drupal 7.x before version 7.5.

-------- SOLUTION

Install the latest version:

  • If you are running Drupal 7.x then upgrade to Drupal 7.5 or 7.6.

The Security Team has released both a pure security update without other bug fixes and a security update combined with other bug fixes and improvements. You can choose to either only include the security update for an immediate fix (which might require less quality assurance and testing) or more fixes and improvements alongside the security fixes by choosing between Drupal 7.5 and Drupal 7.6. Read the announcement [3] for more information.

See also the Drupal core [4] project page.

-------- REPORTED BY

  • The File access bypass was reported by Florian Weber [5].

-------- FIXED BY

  • The File access bypass was fixed by Stéphane Corlosquet [6] and Károly Négyesi [7], both members of the Drupal security team.

-------- CONTACT AND MORE INFORMATION

The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [8].

Learn more about the Drupal Security team and their policies [9], writing secure code for Drupal [10], and securing your site [11].

[1] http://drupal.org/project/drupal [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/drupal-7.6 [4] http://drupal.org/project/drupal [5] http://drupal.org/user/254778 [6] http://drupal.org/user/52142 [7] http://drupal.org/user/9446 [8] http://drupal.org/contact [9] http://drupal.org/security-team [10] http://drupal.org/writing-secure-code [11] http://drupal.org/security/secure-configuration

This update has been submitted for testing by limb.

13 years ago

This update has been pushed to testing

13 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

13 years ago

This update has been submitted for stable by limb.

13 years ago

This update has been pushed to stable

13 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
13 years ago
in testing
13 years ago
in stable
13 years ago
BZ#726222 drupal7: access bypass vulnerability in 7.x (SA-CORE-2011-003)
0
0
BZ#726241 drupal7: access bypass vulnerability in 7.x (SA-CORE-2011-003) [epel-5]
0
0
BZ#726242 drupal7: access bypass vulnerability in 7.x (SA-CORE-2011-003) [epel-6]
0
0
BZ#726243 drupal7: access bypass vulnerability in 7.x (SA-CORE-2011-003) [fedora-all]
0
0

Automated Test Results