Arch Linux Security Advisory ASA-201510-21
==========================================

Severity: Low
Date    : 2015-10-23
CVE-ID  : CVE-2015-7943
Package : drupal
Type    : open redirect
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package drupal before version 7.41-1 is vulnerable to open redirect.

Resolution
==========

Upgrade to 7.41-1.

# pacman -Syu "drupal>=7.41-1"

The problems have been fixed upstream in version 7.41.

Workaround
==========

None.

Description
===========

The Overlay module in Drupal core displays administrative pages as a
layer over the current page (using JavaScript), rather than replacing
the page in the browser window. The Overlay module does not sufficiently
validate URLs prior to displaying their contents, leading to an open
redirect vulnerability.

This vulnerability is mitigated by the fact that it can only be used
against site users who have the "Access the administrative overlay"
permission, and that the Overlay module must be enabled.

Impact
======

A remote attacker is able to make use of the insufficient URL validation
to misuse it as an open redirect relay and display the content of
arbitrary URLs.

References
==========

https://www.drupal.org/SA-CORE-2015-004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7943

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to