Vulnerabilities
Note: the
device may not be impacted by all of these issues. The vulnerabilities are
implied based on the software and version.
CVE-2012-5653
|
The file
upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote
authenticated users to bypass the protection mechanism and execute arbitrary
PHP code via a null byte in a file name.
|
CVE-2014-5021
|
Cross-site
scripting (XSS) vulnerability in the Form API in Drupal 6.x before 6.32 and
possibly 7.x before 7.29 allows remote authenticated users with the
"administer taxonomy" permission to inject arbitrary web script or
HTML via an option group label.
|
CVE-2014-0117
|
The mod_proxy
module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is
enabled, allows remote attackers to cause a denial of service (child-process
crash) via a crafted HTTP Connection header.
|
CVE-2014-0118
|
The
deflate_in_filter function in mod_deflate.c in the mod_deflate module in the
Apache HTTP Server before 2.4.10, when request body decompression is enabled,
allows remote attackers to cause a denial of service (resource consumption)
via crafted request data that decompresses to a much larger size.
|
CVE-2012-0825
|
Drupal 6.x
before 6.23 and 7.x before 7.11 does not verify that Attribute Exchange (AX)
information is signed, which allows remote attackers to modify potentially
sensitive AX information without detection via a man-in-the-middle (MITM)
attack.
|
CVE-2012-2922
|
The
request_path function in includes/bootstrap.inc in Drupal 7.14 and earlier
allows remote attackers to obtain sensitive information via the q[] parameter
to index.php, which reveals the installation path in an error message.
|
CVE-2016-0736
|
In Apache HTTP
Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its
data/cookie using the configured ciphers with possibly either CBC or ECB
modes of operation (AES256-CBC by default), hence no selectable or builtin
authenticated encryption. This made it vulnerable to padding oracle attacks,
particularly with CBC.
|
CVE-2010-3093
|
The comment
module in Drupal 5.x before 5.23 and 6.x before 6.18 allows remote
authenticated users with certain privileges to bypass intended access
restrictions and reinstate removed comments via a crafted URL, related to an
"unpublishing bypass" issue.
|
CVE-2015-3185
|
The
ap_some_auth_required function in server/request.c in the Apache HTTP Server
2.4.x before 2.4.14 does not consider that a Require directive may be associated
with an authorization setting rather than an authentication setting, which
allows remote attackers to bypass intended access restrictions in
opportunistic circumstances by leveraging the presence of a module that
relies on the 2.2 API behavior.
|
CVE-2015-3184
|
mod_authz_svn
in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using
Apache httpd 2.4.x, does not properly restrict anonymous access, which allows
remote anonymous users to read hidden files via the path name.
|
CVE-2015-6661
|
Drupal 6.x
before 6.37 and 7.x before 7.39 allows remote attackers to obtain sensitive
node titles by reading the menu.
|
CVE-2018-1312
|
In Apache
httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication
challenge, the nonce sent to prevent reply attacks was not correctly
generated using a pseudo-random seed. In a cluster of servers using a common
Digest authentication configuration, HTTP requests could be replayed across
servers by an attacker without detection.
|
CVE-2014-0098
|
The log_cookie
function in mod_log_config.c in the mod_log_config module in the Apache HTTP
Server before 2.4.8 allows remote attackers to cause a denial of service
(segmentation fault and daemon crash) via a crafted cookie that is not
properly handled during truncation.
|
CVE-2014-5267
|
modules/openid/xrds.inc
in Drupal 6.x before 6.33 and 7.x before 7.31 allows remote attackers to have
unspecified impact via a crafted DOCTYPE declaration in an XRDS document.
|
CVE-2014-5266
|
The Incutio
XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x
before 6.33 and 7.x before 7.31, does not limit the number of elements in an
XML document, which allows remote attackers to cause a denial of service (CPU
consumption) via a large document, a different vulnerability than
CVE-2014-5265.
|
CVE-2014-5265
|
The Incutio
XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x
before 6.33 and 7.x before 7.31, permits entity declarations without
considering recursion during entity expansion, which allows remote attackers
to cause a denial of service (memory and CPU consumption) via a crafted XML
document containing a large number of nested entity references, a similar
issue to CVE-2003-1564.
|
CVE-2010-3685
|
The OpenID
module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4
for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of
openid.response_nonce values, which allows remote attackers to bypass
authentication by leveraging an assertion from an OpenID provider.
|
CVE-2016-8612
|
Apache HTTP
Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper
Input Validation in the protocol parsing logic in the load balancer resulting
in a Segmentation Fault in the serving httpd process.
|
CVE-2014-0226
|
Race condition
in the mod_status module in the Apache HTTP Server before 2.4.10 allows
remote attackers to cause a denial of service (heap-based buffer overflow),
or possibly obtain sensitive credential information or execute arbitrary
code, via a crafted request that triggers improper scoreboard handling within
the status_handler function in modules/generators/mod_status.c and the
lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
|
CVE-2015-2749
|
Open redirect
vulnerability in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote
attackers to redirect users to arbitrary web sites and conduct phishing
attacks via a URL in the destination parameter.
|
CVE-2013-6385
|
The form API
in Drupal 6.x before 6.29 and 7.x before 7.24, when used with unspecified
third-party modules, performs form validation even when CSRF validation has
failed, which might allow remote attackers to trigger application-specific
impacts such as arbitrary code execution via application-specific vectors.
|
CVE-2013-6386
|
Drupal 6.x
before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate
random numbers, which uses predictable seeds and allows remote attackers to
predict security strings and bypass intended restrictions via a brute force
attack.
|
CVE-2014-3523
|
Memory leak in
the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the
Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default
AcceptFilter is enabled, allows remote attackers to cause a denial of service
(memory consumption) via crafted requests.
|
CVE-2014-1475
|
The OpenID
module in Drupal 6.x before 6.30 and 7.x before 7.26 allows remote OpenID
users to authenticate as other users via unspecified vectors.
|
CVE-2017-15710
|
In Apache
httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29,
mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the
Accept-Language header value to lookup the right charset encoding when
verifying the user's credentials. If the header value is not present in the
charset conversion table, a fallback mechanism is used to truncate it to a
two characters value to allow a quick retry (for example, 'en-US' is
truncated to 'en'). A header value of less than two characters forces an out
of bound write of one NUL byte to a memory location that is not part of the
string. In the worst case, quite unlikely, the process would crash which
could be used as a Denial of Service attack. In the more likely case, this
memory is already reserved for future use and the issue has no effect at all.
|
CVE-2010-3091
|
The OpenID
module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4
for Drupal, violates the OpenID 2.0 protocol by not verifying the
openid.return_to value, which allows remote attackers to bypass authentication
by leveraging an assertion from an OpenID provider.
|
CVE-2017-15715
|
In Apache
httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could
match '$' to a newline character in a malicious filename, rather than
matching only the end of the filename. This could be exploited in
environments where uploads of some files are are externally blocked, but only
by matching the trailing portion of the filename.
|
CVE-2013-6438
|
The
dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache
HTTP Server before 2.4.8 does not properly remove whitespace characters from
CDATA sections, which allows remote attackers to cause a denial of service
(daemon crash) via a crafted DAV WRITE request.
|
CVE-2017-7679
|
In Apache
httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte
past the end of a buffer when sending a malicious Content-Type response
header.
|
CVE-2014-5019
|
The multisite
feature in Drupal 6.x before 6.32 and 7.x before 7.29 allows remote attackers
to cause a denial of service via a crafted HTTP Host header, related to
determining which configuration file to use.
|
CVE-2019-10909
|
In Symfony
before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and
4.2.x before 4.2.7, validation messages are not escaped, which can lead to
XSS when user input is included. This is related to symfony/framework-bundle.
|
CVE-2016-3171
|
Drupal 6.x
before 6.38, when used with PHP before 5.4.45, 5.5.x before 5.5.29, or 5.6.x
before 5.6.13, might allow remote attackers to execute arbitrary code via
vectors related to session data truncation.
|
CVE-2015-6658
|
Cross-site
scripting (XSS) vulnerability in the Autocomplete system in Drupal 6.x before
6.37 and 7.x before 7.39 allows remote attackers to inject arbitrary web
script or HTML via a crafted URL, related to uploading files.
|
CVE-2014-2983
|
Drupal 6.x
before 6.31 and 7.x before 7.27 does not properly isolate the cached data of
different anonymous users, which allows remote anonymous users to obtain
sensitive interim form input information in opportunistic situations via
unspecified vectors.
|
CVE-2018-17199
|
In Apache HTTP
Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry
time before decoding the session. This causes session expiry time to be
ignored for mod_session_cookie sessions since the expiry time is loaded when
the session is decoded.
|
CVE-2017-9788
|
In Apache
httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in
[Proxy-]Authorization headers of type 'Digest' was not initialized or reset
before or between successive key=value assignments by mod_auth_digest.
Providing an initial key with no '=' assignment could reflect the stale value
of uninitialized pool memory used by the prior request, leading to leakage of
potentially confidential information, and a segfault in other cases resulting
in denial of service.
|
CVE-2014-8109
|
mod_lua.c in
the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10
does not support an httpd configuration in which the same Lua authorization provider
is used with different arguments within different contexts, which allows
remote attackers to bypass intended access restrictions in opportunistic
circumstances by leveraging multiple Require directives, as demonstrated by a
configuration that specifies authorization for one group to access a certain
directory, and authorization for a second group to access a second directory.
|
CVE-2017-9798
|
Apache httpd
allows remote attackers to read secret data from process memory if the Limit
directive can be set in a user's .htaccess file, or if httpd.conf has certain
misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server
through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an
unauthenticated OPTIONS HTTP request when attempting to read secret data.
This is a use-after-free issue and thus secret data is not always sent, and
the specific data depends on many factors including configuration.
Exploitation with .htaccess can be blocked with a patch to the
ap_limit_section function in server/core.c.
|
CVE-2015-3234
|
The OpenID
module in Drupal 6.x before 6.36 and 7.x before 7.38 allows remote attackers
to log into other users' accounts by leveraging an OpenID identity from
certain providers, as demonstrated by the Verisign, LiveJournal, and StackExchange
providers.
|
CVE-2007-6752
|
** DISPUTED **
Cross-site request forgery (CSRF) vulnerability in Drupal 7.12 and earlier
allows remote attackers to hijack the authentication of arbitrary users for
requests that end a session via the user/logout URI. NOTE: the vendor
disputes the significance of this issue, by considering the "security
benefit against platform complexity and performance impact" and
concluding that a change to the logout behavior is not planned because
"for most sites it is not worth the trade-off."
|
CVE-2010-3686
|
The OpenID
module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4
for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are
signed, which allows remote attackers to bypass authentication by leveraging
an assertion from an OpenID provider.
|
CVE-2016-2161
|
In Apache HTTP
Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause
the server to crash, and each instance continues to crash even for
subsequently valid requests.
|
CVE-2013-0244
|
Cross-site
scripting (XSS) vulnerability in Drupal 6.x before 6.28 and 7.x before 7.19,
when running with older versions of jQuery that are vulnerable to
CVE-2011-4969, allows remote attackers to inject arbitrary web script or HTML
via vectors involving unspecified Javascript functions that are used to
select DOM elements.
|
CVE-2009-4371
|
Cross-site
scripting (XSS) vulnerability in the Locale module
(modules/locale/locale.module) in Drupal Core 6.14, and possibly other
versions including 6.15, allows remote authenticated users with
"administer languages" permissions to inject arbitrary web script
or HTML via the (1) Language name in English or (2) Native language name
fields in the Custom language form.
|
CVE-2016-3167
|
Open redirect
vulnerability in the drupal_goto function in Drupal 6.x before 6.38, when
used with PHP before 5.4.7, allows remote attackers to redirect users to
arbitrary web sites and conduct phishing attacks via a double-encoded URL in
the "destination" parameter.
|
CVE-2014-0231
|
The mod_cgid
module in the Apache HTTP Server before 2.4.10 does not have a timeout
mechanism, which allows remote attackers to cause a denial of service
(process hang) via a request to a CGI script that does not read from its
stdin file descriptor.
|
CVE-2012-5651
|
Drupal 6.x
before 6.27 and 7.x before 7.18 displays information for blocked users, which
might allow remote attackers to obtain sensitive information by reading the
search results.
|
CVE-2010-3094
|
Multiple
cross-site scripting (XSS) vulnerabilities in Drupal 6.x before 6.18 allow
remote authenticated users with certain privileges to inject arbitrary web
script or HTML via (1) an action description, (2) an action message, (3) a
node, or (4) a taxonomy term, related to the actions feature and the trigger
module.
|
CVE-2019-0220
|
A
vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path
component of a request URL contains multiple consecutive slashes ('/'),
directives such as LocationMatch and RewriteRule must account for duplicates
in regular expressions while other aspects of the servers processing will
implicitly collapse them.
|
CVE-2010-3092
|
The upload
module in Drupal 5.x before 5.23 and 6.x before 6.18 does not properly
support case-insensitive filename handling in a database configuration, which
allows remote authenticated users to bypass the intended restrictions on
downloading a file by uploading a different file with a similar name.
|
CVE-2015-2750
|
Open redirect
vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x
before 7.35 allows remote attackers to redirect users to arbitrary web sites
and conduct phishing attacks via vectors involving the "//" initial
sequence.
|
CVE-2012-0826
|
Cross-site
request forgery (CSRF) vulnerability in the Aggregator module in Drupal 6.x
before 6.23 and 7.x before 7.11 allows remote attackers to hijack the
authentication of unspecified victims for requests that update feeds and
possibly cause a denial of service (loss of updates due to rate limit) via
unspecified vectors.
|
CVE-2016-4975
|
Possible CRLF
injection allowing HTTP response splitting attacks for sites which use
mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32
which prohibit CR or LF injection into the "Location" or other
outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected
2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
|
CVE-2013-0245
|
The printer
friendly version functionality in the Book module in Drupal 6.x before 6.28
and 7.x before 7.19 does not properly restrict access to node that are part
of a book outline, which allows remote authenticated users with the
"access printer-friendly version" permission to read node titles
and possibly node content via unspecified vectors.
|
CVE-2018-1283
|
In Apache
httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session
data to CGI applications (SessionEnv on, not the default), a remote user may
influence their content by using a "Session" header. This comes
from the "HTTP_SESSION" variable name used by mod_session to
forward its data to CGIs, since the prefix "HTTP_" is also used by
the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
|
CVE-2016-3168
|
The System
module in Drupal 6.x before 6.38 and 7.x before 7.43 might allow remote
attackers to hijack the authentication of site administrators for requests
that download and run files with arbitrary JSON-encoded content, aka a
"reflected file download vulnerability."
|
CVE-2016-3169
|
The User
module in Drupal 6.x before 6.38 and 7.x before 7.43 allows remote attackers
to gain privileges by leveraging contributed or custom code that calls the
user_save function with an explicit category and loads all roles into the
array.
|
CVE-2016-8743
|
Apache HTTP
Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the
whitespace accepted from requests and sent in response lines and headers.
Accepting these different behaviors represented a security concern when httpd
participates in any chain of proxies or interacts with back-end application
servers, either through mod_proxy or using conventional CGI mechanisms, and
may result in request smuggling, response splitting and cache pollution.
|
CVE-2016-3164
|
Drupal 6.x
before 6.38, 7.x before 7.43, and 8.x before 8.0.4 might allow remote
attackers to conduct open redirect attacks by leveraging (1) custom code or
(2) a form shown on a 404 error page, related to path manipulation.
|
CVE-2016-3165
|
The Form API
in Drupal 6.x before 6.38 ignores access restrictions on submit buttons, which
might allow remote attackers to bypass intended access restrictions by
leveraging permission to submit a form with a button that has
"#access" set to FALSE in the server-side form definition.
|
CVE-2016-3166
|
CRLF injection
vulnerability in the drupal_set_header function in Drupal 6.x before 6.38,
when used with PHP before 5.1.2, allows remote attackers to inject arbitrary
HTTP headers and conduct HTTP response splitting attacks by leveraging a
module that allows user-submitted data to appear in HTTP headers.
|
CVE-2016-3163
|
The XML-RPC
system in Drupal 6.x before 6.38 and 7.x before 7.43 might make it easier for
remote attackers to conduct brute-force attacks via a large number of calls
made at once to the same method.
|
CVE-2012-5652
|
Drupal 6.x
before 6.27 allows remote attackers to obtain sensitive information about
uploaded files via a (1) RSS feed or (2) search result.
|
CVE-2015-6660
|
The Form API
in Drupal 6.x before 6.37 and 7.x before 7.39 does not properly validate the
form token, which allows remote attackers to conduct CSRF attacks that upload
files in a different user's account via vectors related to "file upload
value callbacks."
|
沒有留言:
張貼留言
注意:只有此網誌的成員可以留言。