CERTA-2007-AVI-011
Vulnerability from certfr_avis - Published: 2007-01-08 - Updated: 2007-01-08None
Description
Plusieurs vulnérabilités découvertes dans Drupal permettent à un utilisateur malintentionné de provoquer un déni de service à distance ou de réaliser des attaques de types Cross Site Scripting.
Un utilisateur malveillant peut exploiter ces vulnérabilités afin d'inclure du code arbitraire sur le serveur. Ce code sera exécuté dans le contexte du navigateur Internet de l'utilisateur accèdant au serveur vulnérable.
Solution
Appliquer les mises à jour de sécurité Drupal en passant à la version 4.6.11 ou 4.7.5 disponibles à l'adresse suivante :
http://drupal.org/project/Drupal+project
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Drupal 4.7.x.",
"product": {
"name": "Drupal",
"vendor": {
"name": "Drupal",
"scada": false
}
}
},
{
"description": "Drupal 4.6.x ;",
"product": {
"name": "Drupal",
"vendor": {
"name": "Drupal",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans Drupal permettent \u00e0 un\nutilisateur malintentionn\u00e9 de provoquer un d\u00e9ni de service \u00e0 distance ou\nde r\u00e9aliser des attaques de types Cross Site Scripting.\n\nUn utilisateur malveillant peut exploiter ces vuln\u00e9rabilit\u00e9s afin\nd\u0027inclure du code arbitraire sur le serveur. Ce code sera ex\u00e9cut\u00e9 dans\nle contexte du navigateur Internet de l\u0027utilisateur acc\u00e8dant au serveur\nvuln\u00e9rable.\n\n## Solution\n\nAppliquer les mises \u00e0 jour de s\u00e9curit\u00e9 Drupal en passant \u00e0 la version\n4.6.11 ou 4.7.5 disponibles \u00e0 l\u0027adresse suivante :\n\n http://drupal.org/project/Drupal+project\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-6646",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6646"
},
{
"name": "CVE-2006-6647",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6647"
}
],
"initial_release_date": "2007-01-08T00:00:00",
"last_revision_date": "2007-01-08T00:00:00",
"links": [
{
"title": "Site Internet Drupal :",
"url": "http://drupal.org/"
}
],
"reference": "CERTA-2007-AVI-011",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Attaques de type cross site scripting"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Drupal",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Drupal sa-2007-002 du 05 janvier 2007",
"url": "http://drupal.org/files/sa-2007-002/advisory.txt"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Drupal sa-2007-001 du 05 janvier 2007",
"url": "http://drupal.org/files/sa-2007-001/advisory.txt"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…