CNVD-2015-04061

Vulnerability from cnvd - Published: 2015-06-29
VLAI Severity ?
Title
Drupal HTTP Strict Transport Security模块身份验证绕过漏洞
Description
Drupal是一套用PHP语言开发的免费、开源的内容管理系统。HTTP Strict Transport Security是一个新的Web安全协议模块。 Drupal HTTP Strict Transport Security module存在身份验证绕过漏洞,允许远程攻击者可利用漏洞实施中间人攻击,绕过安全限制。
Severity
Patch Name
Drupal HTTP Strict Transport Security模块身份验证绕过漏洞的补丁
Patch Description
Drupal是一套用PHP语言开发的免费、开源的内容管理系统。HTTP Strict Transport Security是一个新的Web安全协议模块。Drupal HTTP Strict Transport Security module存在身份验证绕过漏洞,允许远程攻击者可利用漏洞实施中间人攻击,绕过安全限制。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: https://www.drupal.org/node/2507543 https://www.drupal.org/node/2507539

Reference
http://www.securityfocus.com/bid/75276
Impacted products
Name
['Drupal HTTP Strict Transport Security Module 7.x-1.x(<7.x-1.2)', 'Drupal HTTP Strict Transport Security Module 6.x-1.x(<6.x-1.1)']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "75276"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-5505"
    }
  },
  "description": "Drupal\u662f\u4e00\u5957\u7528PHP\u8bed\u8a00\u5f00\u53d1\u7684\u514d\u8d39\u3001\u5f00\u6e90\u7684\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\u3002HTTP Strict Transport Security\u662f\u4e00\u4e2a\u65b0\u7684Web\u5b89\u5168\u534f\u8bae\u6a21\u5757\u3002\r\n\r\nDrupal HTTP Strict Transport Security module\u5b58\u5728\u8eab\u4efd\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u5b9e\u65bd\u4e2d\u95f4\u4eba\u653b\u51fb\uff0c\u7ed5\u8fc7\u5b89\u5168\u9650\u5236\u3002",
  "discovererName": "Mark Burdett",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://www.drupal.org/node/2507543 \r\nhttps://www.drupal.org/node/2507539",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-04061",
  "openTime": "2015-06-29",
  "patchDescription": "Drupal\u662f\u4e00\u5957\u7528PHP\u8bed\u8a00\u5f00\u53d1\u7684\u514d\u8d39\u3001\u5f00\u6e90\u7684\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\u3002HTTP Strict Transport Security\u662f\u4e00\u4e2a\u65b0\u7684Web\u5b89\u5168\u534f\u8bae\u6a21\u5757\u3002Drupal HTTP Strict Transport Security module\u5b58\u5728\u8eab\u4efd\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u5b9e\u65bd\u4e2d\u95f4\u4eba\u653b\u51fb\uff0c\u7ed5\u8fc7\u5b89\u5168\u9650\u5236\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Drupal HTTP Strict Transport Security\u6a21\u5757\u8eab\u4efd\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Drupal HTTP Strict Transport Security Module 7.x-1.x(\u003c7.x-1.2)",
      "Drupal HTTP Strict Transport Security Module 6.x-1.x(\u003c6.x-1.1)"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/75276",
  "serverity": "\u4e2d",
  "submitTime": "2015-06-26",
  "title": "Drupal HTTP Strict Transport Security\u6a21\u5757\u8eab\u4efd\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…