[arch-security] [ASA-201510-21] drupal: open redirect
Arch Linux Security Advisory ASA-201510-21 ========================================== Severity: Low Date : 2015-10-23 CVE-ID : CVE-2015-7943 Package : drupal Type : open redirect Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package drupal before version 7.41-1 is vulnerable to open redirect. Resolution ========== Upgrade to 7.41-1. # pacman -Syu "drupal>=7.41-1" The problems have been fixed upstream in version 7.41. Workaround ========== None. Description =========== The Overlay module in Drupal core displays administrative pages as a layer over the current page (using JavaScript), rather than replacing the page in the browser window. The Overlay module does not sufficiently validate URLs prior to displaying their contents, leading to an open redirect vulnerability. This vulnerability is mitigated by the fact that it can only be used against site users who have the "Access the administrative overlay" permission, and that the Overlay module must be enabled. Impact ====== A remote attacker is able to make use of the insufficient URL validation to misuse it as an open redirect relay and display the content of arbitrary URLs. References ========== https://www.drupal.org/SA-CORE-2015-004 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7943
participants (1)
-
Levente Polyak