Secunia Security Advisory - A vulnerability has been reported in the Localization client module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.
5bff433df50a3d2bca14cdc29fc184951408b1115f5a0a391fb9902b0a1e05dd
----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
http://secunia.com/binary_analysis/sample_analysis/
----------------------------------------------------------------------
TITLE:
Drupal Localization client Module Cross-Site Request Forgery
SECUNIA ADVISORY ID:
SA32388
VERIFY ADVISORY:
http://secunia.com/advisories/32388/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting, Manipulation of data
WHERE:
>From remote
SOFTWARE:
Localization client 6.x (module for Drupal)
http://secunia.com/advisories/product/20224/
Localization client 5.x (module for Drupal)
http://secunia.com/advisories/product/20223/
DESCRIPTION:
A vulnerability has been reported in the Localization client module
for Drupal, which can be exploited by malicious people to conduct
cross-site request forgery attacks.
The vulnerability is caused due to the application allowing users to
perform certain actions via HTTP requests without performing any
validity checks to verify the request. This can be exploited to
manipulate translation data by enticing a user to visit a malicious
web page.
The vulnerability is reported in all 5.x versions prior to 5.x-1.1
and all 6.x versions prior to 6.x-1.6.
SOLUTION:
Update to version 5.x-1.1 or 6.x-1.6.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Gábor Hojtsy and Jose A Reyero.
ORIGINAL ADVISORY:
DRUPAL-SA-2008-068:
http://drupal.org/node/324862
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------