lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed,  7 Mar 2012 20:25:08 +0000 (UTC)
From: security-news@...pal.org
To: security-news@...pal.org
Subject: [Security-news] SA-CONTRIB-2012-031 - Multiple
	Modules Unsupported	- UC PayDutchGroup - Information leakage
	and Multisite Search	sql injection

  * Advisory ID: DRUPAL-SA-CONTRIB-2012-031
  * Projects: UC PayDutchGroup / WeDeal payment [1], Multisite Search [2]
    (third-party modules)
  * Version: 6.x
  * Date: 2012-March-7
  * Security risk: Critical [3]
  * Exploitable from: Remote
  * Vulnerability: Information Disclosure

-------- DESCRIPTION  
---------------------------------------------------------

UC PayDutchGroup / WeDeal payment [4] integrates the PayDutchGroup / WeDeal
payment gateway with Ubercart. The module exposes account credentials for the
store's PayDutchGroup account under certain circumstances allowing a
malicious user to login to the PayDutchGroup site as the store owner and
manage the store owner's account. The vulnerability is mitigated by an
attacker needing to gain an account with the ability to checkout of the
store.

Multisite Search [5] allows you to index and search content from all sites in
a Multisite configuration. The module doesn't sufficiently escape user input
when constructing queries. The vulnerability is mitigated by the fact that in
order to execute arbitrary sql injection malicious users must have the
ability to administer multisite search.
-------- VERSIONS AFFECTED  
---------------------------------------------------


All versions of UC PayDutchGroup / WeDeal payment are affected by
vulnerabilities.

All versions of Multisite Search payment are affected by vulnerabilities.

Drupal core is not affected. If you do not use one of the contributed modules
listed above, there is nothing you need to do.

-------- SOLUTION  
------------------------------------------------------------

Users of thes modules are encouraged to disable the modules and search for
similar alternatives. Users of the module who wish to take over
maintainership should post patches to the issue queue to fix the security
issues and request maintenance following the Unsupported project process [6]

-------- REPORTED BY  
---------------------------------------------------------

  * UC PayDutchGroup / WeDeal payment issue reported by Rolf Meijer [7]
  * Multisite Search issue reported by Justin Klein Keane [8]

-------- FIXED BY  
------------------------------------------------------------

No fixes created.

-------- CONTACT AND MORE INFORMATION  
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [9].

Learn more about the Drupal Security team and their policies [10], writing
secure code for Drupal [11], and securing your site [12].


[1] http://drupal.org/project/uc_paydutch
[2] http://drupal.org/project/multisite_search
[3] http://drupal.org/security-team/risk-levels
[4] http://drupal.org/project/uc_paydutch
[5] http://drupal.org/project/multisite_search
[6] http://drupal.org/node/251466
[7] http://drupal.org/user/358052
[8] http://drupal.org/user/302225
[9] http://drupal.org/contact
[10] http://drupal.org/security-team
[11] http://drupal.org/writing-secure-code
[12] http://drupal.org/security/secure-configuration

_______________________________________________
Security-news mailing list
Security-news@...pal.org
http://lists.drupal.org/mailman/listinfo/security-news

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ