drupal-6.13-1AXS3

エラータID: AXSA:2009-75:03

Release date: 
Tuesday, July 14, 2009 - 21:56
Subject: 
drupal-6.13-1AXS3
Affected Channels: 
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity: 
High
Description: 

Drupal is a free software package that allows an individual or a community of users to easily publish, manage and organize a wide variety of content on a website. Tens of thousands of people and organizations have used Drupal to power scores of different web sites, including
* Community web portals
* Discussion sites
* Corporate web sites
* Intranet applications
* Personal web sites or blogs
* Aficionado sites
* E-commerce applications
* Resource directories
* Social Networking sites
Fixed bugs:
Cross-site scripting
The Forum module does not correctly handle certain arguments obtained from the URL. By enticing a suitably privileged user to visit a specially crafted URL, a malicious user is able to insert arbitrary HTML and script code into forum pages. Such a cross-site scripting attack may lead to the malicious user gaining administrative access. Wikipedia has more information about cross-site scripting [1] (XSS). This issue affects Drupal 6.x only.
Input format access bypass
User signatures have no separate input format, they use the format of the comment with which they are displayed. A user will no longer be able to edit a comment when an administrator changes the comment's input format to a format that is not accessible to the user. However they will still be able to modify their signature, which will then be processed by the new input format. If the new format is very permissive, via their signature, the user may be able to insert arbitrary HTML and script code into pages or, when the PHP filter is enabled for the new format, execute PHP code. This issue affects Drupal 6.x only.
Password leaked in URL
When an anonymous user fails to login due to mistyping his username or password, and the page he is on contains a sortable table, the (incorrect) username and password are included in links on the table. If the user visits these links the password may then be leaked to external sites via the HTTP referer. In addition, if the anonymous user is enticed to visit the site via a specially crafted URL while the Drupal page cache is enabled, a malicious user might be able to retrieve the (incorrect) username and password from the page cache. This issue affects both Drupal 5.x and Drupal 6.x

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. drupal-6.13-1AXS3.src.rpm
    MD5: 18a499f83e043a45e756158a84b34033
    SHA-256: e3aa8e2b797bac35b7f305e46c044516cb2a2f65e9d78922c06394c92b86bf35
    Size: 1.88 MB

Asianux Server 3 for x86
  1. drupal-6.13-1AXS3.noarch.rpm
    MD5: 68e57d927a41d8192ac32259238df292
    SHA-256: 6e57ba714612865f035280eadd9af907659b3215472dc0ddf037966bc8384fe0
    Size: 1.90 MB

Asianux Server 3 for x86_64
  1. drupal-6.13-1AXS3.noarch.rpm
    MD5: f4dab1cca6e2b0686f4863c173ded4a4
    SHA-256: ac932b3e92d40446734a1872e7a0c0d529dbdb3bcdc702e2a3a178551de01e5a
    Size: 1.89 MB