Secunia Security Advisory - A vulnerability has been reported in Drupal, which can potentially be exploited by malicious, local users to gain escalated privileges.
3c251ddc8c1f629fbece0dabf1c61870149ae3a8d5fb7baf162012ecdc0319d5
----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
http://secunia.com/binary_analysis/sample_analysis/
----------------------------------------------------------------------
TITLE:
Drupal Virtual Hosts Local File Inclusion
SECUNIA ADVISORY ID:
SA32389
VERIFY ADVISORY:
http://secunia.com/advisories/32389/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
Drupal 5.x
http://secunia.com/advisories/product/13378/
Drupal 6.x
http://secunia.com/advisories/product/17839/
DESCRIPTION:
A vulnerability has been reported in Drupal, which can potentially be
exploited by malicious, local users to gain escalated privileges.
Input passed to unspecified parameters is not properly verified
before being used to include files. This can be exploited to include
specially named files from local resources and potentially escalate
privileges.
Successful exploitation requires that the web server is configured to
use virtual hosts.
The vulnerability is reported in all 5.x versions prior to 5.12 and
all 6.x versions prior to 6.6.
SOLUTION:
Update to version 5.12 or 6.6.
Apply the vendor's official patches to versions 5.11 or 6.5:
Drupal 5.11:
http://drupal.org/files/sa-2008-067/SA-2008-067-5.11.patch
Drupal 6.5:
http://drupal.org/files/sa-2008-067/SA-2008-067-6.5.patch
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Anthony Ferrara.
ORIGINAL ADVISORY:
DRUPAL-SA-2008-067:
http://drupal.org/node/324824
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------