[arch-security] [ASA-201510-21] drupal: open redirect

Levente Polyak anthraxx at archlinux.org
Fri Oct 23 22:57:40 UTC 2015


Arch Linux Security Advisory ASA-201510-21
==========================================

Severity: Low
Date    : 2015-10-23
CVE-ID  : CVE-2015-7943
Package : drupal
Type    : open redirect
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package drupal before version 7.41-1 is vulnerable to open redirect.

Resolution
==========

Upgrade to 7.41-1.

# pacman -Syu "drupal>=7.41-1"

The problems have been fixed upstream in version 7.41.

Workaround
==========

None.

Description
===========

The Overlay module in Drupal core displays administrative pages as a
layer over the current page (using JavaScript), rather than replacing
the page in the browser window. The Overlay module does not sufficiently
validate URLs prior to displaying their contents, leading to an open
redirect vulnerability.

This vulnerability is mitigated by the fact that it can only be used
against site users who have the "Access the administrative overlay"
permission, and that the Overlay module must be enabled.

Impact
======

A remote attacker is able to make use of the insufficient URL validation
to misuse it as an open redirect relay and display the content of
arbitrary URLs.

References
==========

https://www.drupal.org/SA-CORE-2015-004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7943

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20151024/c80e9e1f/attachment.asc>


More information about the arch-security mailing list