Bug 924645 (CVE-2015-2749) - VUL-2: CVE-2015-2749, CVE-2015-2750, CVE-2015-2559: drupal,drupal6,drupal7: multiple vulnerabilities
Summary: VUL-2: CVE-2015-2749, CVE-2015-2750, CVE-2015-2559: drupal,drupal6,drupal7: m...
Status: RESOLVED FIXED
Alias: CVE-2015-2749
Product: openSUSE.org
Classification: openSUSE
Component: 3rd party software (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.2
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Aeneas Jaißle
QA Contact: E-mail List
URL: https://www.drupal.org/SA-CORE-2015-001
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-27 09:54 UTC by Andreas Stieger
Modified: 2015-03-27 10:33 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-03-27 09:54:59 UTC
Not an openSUSE distribution package, but assigning to community project (server:php:applications) maintainer:

From https://www.drupal.org/SA-CORE-2015-001

Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2015-001
Posted by Drupal Security Team on March 18, 2015 at 6:04pm

    Advisory ID: DRUPAL-SA-CORE-2015-001
    Project: Drupal core
    Version: 6.x, 7.x
    Date: 2015-March-18
    Security risk: 14/25 ( Moderately Critical) AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default
    Vulnerability: Access bypass, Open Redirect, Multiple vulnerabilities

Description
Access bypass (Password reset URLs - Drupal 6 and 7)

Password reset URLs can be forged under certain circumstances, allowing an attacker to gain access to another user's account without knowing the account's password.

In Drupal 7, this vulnerability is mitigated by the fact that it can only be exploited on sites where accounts have been imported or programmatically edited in a way that results in the password hash in the database being the same for multiple user accounts. In Drupal 6, it can additionally be exploited on sites where administrators have created multiple new user accounts with the same password via the administrative interface, or where accounts have been imported or programmatically edited in a way that results in the password hash in the database being empty for at least one user account.

Drupal 6 sites that have empty password hashes, or a password field with a guessable string in the database, are especially prone to this vulnerability. This could apply to sites that use external authentication so that the password field is set to a fixed, invalid value.
Open redirect (Several vectors including the "destination" URL parameter - Drupal 6 and 7)

Drupal core and contributed modules frequently use a "destination" query string parameter in URLs to redirect users to a new destination after completing an action on the current page. Under certain circumstances, malicious users can use this parameter to construct a URL that will trick users into being redirected to a 3rd party website, thereby exposing the users to potential social engineering attacks.

In addition, several URL-related API functions in Drupal 6 and 7 can be tricked into passing through external URLs when not intending to, potentially leading to additional open redirect vulnerabilities.

This vulnerability is mitigated by the fact that many common uses of the "destination" parameter are not susceptible to the attack. However, all confirmation forms built using Drupal 7's form API are vulnerable via the Cancel action that appears at the bottom of the form, and some Drupal 6 confirmation forms are vulnerable too.

CVE identifier(s) issued

    Access bypass via password reset URLs: CVE-2015-2559
    Open redirect via the "destination" URL parameter: CVE-2015-2749
    Open redirect via URL-related API functions: CVE-2015-2750

Versions affected

    Drupal core 6.x versions prior to 6.35
    Drupal core 7.x versions prior to 7.35
Comment 1 Aeneas Jaißle 2015-03-27 10:33:13 UTC
https://build.opensuse.org/request/show/293394

server:php:applications/drupal7 was updated to 7.35 a minute ago