Changes between Initial Version and Version 1 of Ticket #809


Ignore:
Timestamp:
11/20/14 10:52:01 (2 years ago)
Author:
paul
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #809

    • Property Summary changed from [Security-news] SA-CONTRIB-2014-115 - Form Builder - Cross-Site Scripting (XSS) to [Security-news] Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2014-006
  • Ticket #809 – Description

    initial v1  
    1 View online: https://www.drupal.org/node/2378441 
     1View online: https://www.drupal.org/SA-CORE-2014-006 
    22 
    3   * Advisory ID: DRUPAL-SA-CONTRIB-2014-115 
    4   * Project: Form Builder [1]     (third-party module) 
     3  * Advisory ID: DRUPAL-SA-CORE-2014-006 
     4  * Project: Drupal core [1] 
    55  * Version: 6.x, 7.x 
    66  * Date: 2014-November-19 
    77  * Security risk: 14/25 ( Moderately Critical) 
    8     AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2] 
    9   * Vulnerability: Cross Site Scripting 
     8    AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2] 
     9  * Vulnerability: Multiple vulnerabilities 
    1010 
    1111-------- DESCRIPTION 
    1212--------------------------------------------------------- 
    1313 
    14 The Form Builder module enables users to build entire Form API structures 
    15 through a graphical, AJAX-like interface. 
     14.... Session hijacking (Drupal 6 and 7) 
    1615 
    17 The module doesn't sufficiently sanitize form titles in some cases. 
     16A specially crafted request can give a user access to another user's session, 
     17allowing an attacker to hijack a random session. 
    1818 
    19 This vulnerability is mitigated by the fact that an attacker must have a role 
    20 with the permission to create forms in another module that depends on Form 
    21 Builder, such as Survey Builder, Webform, or others. 
     19This attack is known to be possible on certain Drupal 7 sites which serve 
     20both HTTP and HTTPS content ("mixed-mode" [3]), but it is possible there are 
     21other attack vectors for both Drupal 6 and Drupal 7. 
     22 
     23.... Denial of service (Drupal 7 only) 
     24 
     25Drupal 7 includes a password hashing API to ensure that user supplied 
     26passwords are not stored in plain text. 
     27 
     28A vulnerability in this API allows an attacker to send specially crafted 
     29requests resulting in CPU and memory exhaustion. This may lead to the site 
     30becoming unavailable or unresponsive (denial of service). 
     31 
     32This vulnerability can be exploited by anonymous users. 
    2233 
    2334 
     
    2536-------------------------------------------- 
    2637 
    27   * /A CVE identifier [3] will be requested, and added upon issuance, in 
     38  * /A CVE identifier [4] will be requested, and added upon issuance, in 
    2839    accordance 
    2940           with Drupal Security Team processes./ 
     
    3243--------------------------------------------------- 
    3344 
    34   * Form Builder 7.x-1.x versions prior to 7.x-1.6. 
    35   * Form Builder 6.x-1.x versions prior to 6.x-1.6. 
    36  
    37 Drupal core is not affected. If you do not use the contributed Form Builder 
    38 [4] module, 
    39       there is nothing you need to do. 
     45  * Drupal core 6.x versions prior to 6.34. 
     46  * Drupal core 7.x versions prior to 7.34. 
    4047 
    4148-------- SOLUTION 
     
    4451Install the latest version: 
    4552 
    46   * If you use the Form Builder module for Drupal 7.x, upgrade to Form  
    47 Builder 
    48     7.x-1.6 [5] 
    49   * If you use the Form Builder module for Drupal 6.x, upgrade to Form  
    50 Builder 
    51     6.x-1.6 [6] 
     53  * If you use Drupal 6.x, upgrade to Drupal core 6.34. [5] 
     54  * If you use Drupal 7.x, upgrade to Drupal core 7.34. [6] 
    5255 
    53 Also see the Form Builder [7] project page. 
     56If you have configured a custom password.inc file for your Drupal 7 site you 
     57also need to make sure that it is not prone to the same denial of service 
     58vulnerability.  See also the similar security advisory for the Drupal 6 
     59contributed Secure Password Hashes module: SA-CONTRIB-2014-113 [7] 
     60 
     61Also see the Drupal core [8] project page. 
    5462 
    5563-------- REPORTED BY 
    5664--------------------------------------------------------- 
    5765 
    58   * Matt Vance [8] provisional member of the Drupal Security Team 
     66Session hijacking: 
     67 
     68  * Aaron Averill [9] 
     69 
     70Denial of service: 
     71 
     72  * Michael Cullum  [10] 
     73  * Javier Nieto [11] 
     74  * Andrés Rojas Guerrero [12] 
    5975 
    6076-------- FIXED BY 
    6177------------------------------------------------------------ 
    6278 
    63   * Francisco José Cruz Romanos [9] provisional member of the Drupal  
    64 Security 
    65     Team 
    66   * Nate Haug [10] 
     79Session hijacking: 
     80 
     81  * Klaus Purer [13] of the Drupal Security Team 
     82  * David Rothstein [14] of the Drupal Security Team 
     83  * Peter Wolanin [15] of the Drupal Security Team 
     84 
     85Denial of service: 
     86 
     87  * Klaus Purer [16] of the Drupal Security Team 
     88  * Peter Wolanin [17] of the Drupal Security Team 
     89  * Heine Deelstra [18] of the Drupal Security Team 
     90  * Tom Phethean [19] 
    6791 
    6892-------- COORDINATED BY 
    6993------------------------------------------------------ 
    7094 
    71   * Matt Vance [11] provisional member of the Drupal Security Team 
     95  * The Drupal Security Team 
    7296 
    7397-------- CONTACT AND MORE INFORMATION 
     
    7599 
    76100The Drupal security team can be reached at security at drupal.org or via the 
    77 contact form at https://www.drupal.org/contact [12]. 
     101contact form at https://www.drupal.org/contact [20]. 
    78102 
    79 Learn more about the Drupal Security team and their policies [13], writing 
    80 secure code for Drupal [14], and  securing your site [15]. 
     103Learn more about the Drupal Security team and their policies [21], writing 
     104secure code for Drupal [22], and  securing your site [23]. 
    81105 
    82106Follow the Drupal Security Team on Twitter at 
    83 https://twitter.com/drupalsecurity [16] 
     107https://twitter.com/drupalsecurity [24] 
    84108 
    85109 
    86 [1] https://www.drupal.org/project/form_builder 
     110[1] https://www.drupal.org/project/drupal 
    87111[2] https://www.drupal.org/security-team/risk-levels 
    88 [3] http://cve.mitre.org/ 
    89 [4] https://www.drupal.org/project/form_builder 
    90 [5] https://www.drupal.org/node/2378445 
    91 [6] https://www.drupal.org/node/2378433 
    92 [7] https://www.drupal.org/project/form_builder 
    93 [8] https://www.drupal.org/user/88338 
    94 [9] https://www.drupal.org/user/848238 
    95 [10] https://www.drupal.org/user/35821 
    96 [11] https://www.drupal.org/user/88338 
    97 [12] https://www.drupal.org/contact 
    98 [13] https://www.drupal.org/security-team 
    99 [14] https://www.drupal.org/writing-secure-code 
    100 [15] https://www.drupal.org/security/secure-configuration 
    101 [16] https://twitter.com/drupalsecurity 
     112[3] https://www.drupal.org/https-information 
     113[4] http://cve.mitre.org/ 
     114[5] https://www.drupal.org/drupal-6.34-release-notes 
     115[6] https://www.drupal.org/drupal-7.34-release-notes 
     116[7] https://www.drupal.org/node/2378367 
     117[8] https://www.drupal.org/project/drupal 
     118[9] https://www.drupal.org/user/1317732 
     119[10] https://www.drupal.org/u/MichaelCu 
     120[11] https://www.drupal.org/u/jnietotn 
     121[12] https://www.drupal.org/u/c0r3dump3d 
     122[13] https://www.drupal.org/u/klausi 
     123[14] https://www.drupal.org/u/David_Rothstein 
     124[15] https://www.drupal.org/u/pwolanin 
     125[16] https://www.drupal.org/u/klausi 
     126[17] https://www.drupal.org/u/pwolanin 
     127[18] https://www.drupal.org/u/Heine 
     128[19] https://www.drupal.org/u/tsphethean 
     129[20] https://www.drupal.org/contact 
     130[21] https://www.drupal.org/security-team 
     131[22] https://www.drupal.org/writing-secure-code 
     132[23] https://www.drupal.org/security/secure-configuration 
     133[24] https://twitter.com/drupalsecurity