Package: drupal
Version: 4.5.3-2
Severity: grave
Justification: user security hole



See http://drupal.org/files/sa-2005-002/advisory.txt


----------------------------------------------------------------------------
Drupal security advisory                                  DRUPAL-SA-2005-002
----------------------------------------------------------------------------
Advisory ID:    DRUPAL-SA-2005-002
Date:           2005-jun-29
Security risk:  highly critical
Impact:         system access
Where:          from remote
Vulnerability:  arbitrary PHP code execution
----------------------------------------------------------------------------

Description
-----------
Kuba Zygmunt discovered a flaw in the input validation routines of Drupal's
filter mechanism.  An attacker could execute arbitrary PHP code on a target 
site when public comments or postings are allowed.

Versions affected
-----------------
Drupal 4.5.0, 4.5.1, 4.5.2, 4.5.3
Drupal 4.6.0, 4.6.1

Solution
--------
Either disable public comments and postings, or upgrade to the latest Drupal
version:
- If you cannot upgrade immediately, you can secure your site by disabling
  public postings and comments.  Log in as an administrator, go to
  "administer >> access control" and make sure that untrusted roles don't
  have the permissions to submit or edit content.
- If you are running Drupal 4.5.x, then upgrade to Drupal 4.5.4.
- If you are running Drupal 4.6.x, then upgrade to Drupal 4.6.2.

Contact
-------
The security contact for Drupal can be reached at [EMAIL PROTECTED] 
or using the form at http://drupal.org/contact.



-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686
Locale: LANG=ru_RU.KOI8-R, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R)

Versions of packages drupal depends on:
ii  apache                       1.3.33-6    versatile, high-performance HTTP s
ii  debconf                      1.4.30.13   Debian configuration management sy
ii  makepasswd                   1.10-2      Generate and encrypt passwords
ii  mysql-client-4.1 [mysql-clie 4.1.11a-4   mysql database client binaries
ii  php4-cli                     4:4.3.10-15 command-line interpreter for the p
ii  php4-mysql                   4:4.3.10-15 MySQL module for php4
ii  postfix [mail-transport-agen 2.1.5-9     A high-performance mail transport 
ii  wwwconfig-common             0.0.43      Debian web auto configuration

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to