what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Drupal 6.20 With Data 6.x-1.0-alpha14 SQL Injection / Cross Site Scripting

Drupal 6.20 With Data 6.x-1.0-alpha14 SQL Injection / Cross Site Scripting
Posted Feb 10, 2011
Authored by Justin C. Klein Keane

Drupal version 6.20 with Data version 6.x-1.0-alpha14 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, xss, sql injection
SHA-256 | 46eef7ea59d38b661e543d3aaba60f8b3839c80236b4b0afc2de402f2b8e5e30

Drupal 6.20 With Data 6.x-1.0-alpha14 SQL Injection / Cross Site Scripting

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Description of Vulnerability:

Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL. The Drupal Data module
(http://drupal.org/project/data) "helps you model, manage and query
related sets of tables. It offers an administration interface and a low
level API for manipulating tables and accessing their contents."

The Data module contains multiple Cross Site Scripting (XSS)
vulnerabilities because it fails to sanitize table descriptions, field
names or labels before display. This results in multiple stored XSS as
well as DOM based XSS vulnerabilities. Drupal site users with the
ability to create or edit tables using the Data module could inject
arbitrary HTML into administrative pages.

The Data module also contains numerous SQL injection vulnerabilities
because it fails to sanitize values for table names or column names
before invoking SQL statements. This allows users with the ability to
create or edit tables managed by the Data module to perform SQL
injection attacks.

Systems affected:

Drupal 6.20 with Data 6.x-1.0-alpha14 was tested and shown to be vulnerable.

Impact

User could inject arbitrary scripts into pages affecting site users.
This could result in administrative account compromise leading to web
server process compromise. A more likely scenario would be for an
attacker to inject hidden content (such as iframes, applets, or embedded
objects) that would attack client browsers in an attempt to compromise
site users' machines. This vulnerability could also be used to launch
cross site request forgery (XSRF) attacks against the site that could
have other unexpected consequences.

Mitigating factors:

In order to exploit this vulnerability the attacker must have
credentials to an authorized account that has been assigned the
permissions to administer or edit in the Data module. This could be
accomplished via social engineering, brute force password guessing, or
abuse or legitimate credentials.

Vendor response:

Drupal security team does not handle issues with pre-release versions of
modules (such as alpha or dev). These issues were reported in the
module's public issue queue (http://drupal.org/node/1056470).

The text of this advisory has also been posted at
http://www.madirish.net/?article=480

- --
Justin C. Klein Keane
http://www.MadIrish.net

The digital signature on this message can be confirmed
using the public key at http://www.madirish.net/gpgkey
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iPwEAQECAAYFAk1S0Y0ACgkQkSlsbLsN1gBxpAcApo+e7x2yhchgc9zZOd2YVqVK
nBt09nmIaQem+dO4fs9l+rQbbMj8ahFJMUH8W82iSRuDQQyhnRF5JTCWMlC3gij5
HbOaxLEkepxFzRkDuRdR/wsraSMsxYBJuRdrG8OM7riuFVSSpM2NIdZXjsX7RIJ1
YTNxCkKT6lMywvc7T4A3e3BQPhIKwceB1HhYuyMcWAZ8oMh69HvTlKQ2A5r8QH/S
exJ4ML4nBY9f+0yE1x4DqtsGl54PPdCwW9shu1FPIr0URtPq21/9ozMFwZRBFuOg
v+lB2+O0+9gMCjQrcLw=
=lrWV
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close