lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20120808182642.A1DB6108053@www2.drupal.org> Date: Wed, 8 Aug 2012 18:26:42 +0000 (UTC) From: security-news@...pal.org To: security-news@...pal.org Subject: [Security-news] SA-CONTRIB-2012-124 - Mime Mail - Access Bypass View online: http://drupal.org/node/1719482 * Advisory ID: DRUPAL-SA-CONTRIB-2012-124 * Project: Mime Mail [1] (third-party module) * Version: 6.x * Date: 2012-August-8 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: Access bypass -------- DESCRIPTION --------------------------------------------------------- The MIME Mail module allows users to send MIME-encoded e-mail messages with embedded images and attachments. The module doesn't perform proper access checks, allowing a user to send arbitrary (e.g. the settings.php) files as attachments. In the latest version users must have the "send arbitrary files" permission to access files located outside the public files directory. CVE: Requested -------- VERSIONS AFFECTED --------------------------------------------------- * Mime Mail 6.x-1.x versions prior to 6.x-1.1. Drupal core is not affected. If you do not use the contributed Mime Mail [3] module, there is nothing you need to do. -------- SOLUTION ------------------------------------------------------------ Install the latest version: * If you use the Mime Mail module for Drupal 6.x, upgrade to Mime Mail 6.x-1.1 [4] Also see the Mime Mail [5] project page. -------- REPORTED BY --------------------------------------------------------- * joglin [6] -------- FIXED BY ------------------------------------------------------------ * Jeremiah Davis [7] the module maintainer * Gabor Seljan [8] the module maintainer -------- COORDINATED BY ------------------------------------------------------ * Greg Knaddison [9] of the Drupal Security Team * Dave Reid [10] of the Drupal Security Team -------- CONTACT AND MORE INFORMATION ---------------------------------------- The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [11]. Learn more about the Drupal Security team and their policies [12], writing secure code for Drupal [13], and securing your site [14]. [1] http://drupal.org/project/mimemail [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/project/mimemail [4] http://drupal.org/node/1719446 [5] http://drupal.org/project/mimemail [6] http://drupal.org/user/86464 [7] http://drupal.org/user/228997 [8] http://drupal.org/user/232117 [9] http://drupal.org/user/36762 [10] http://drupal.org/user/53892 [11] http://drupal.org/contact [12] http://drupal.org/security-team [13] http://drupal.org/writing-secure-code [14] http://drupal.org/security/secure-configuration _______________________________________________ Security-news mailing list Security-news@...pal.org Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists