SB2011063003 - Fedora EPEL 6 update for drupal7
Published: June 30, 2011 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2011-2687)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability is caused by incorrect filtration of input data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Cross-site scripting (CVE-ID: CVE-2011-2687)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability is caused by incorrect filtration of input data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Access bypass (CVE-ID: CVE-2011-2687)
The vulnerability allows a remote user to get unrestricted access to private files.The weakness exists due to using of private files in combination with a node access module that allows a malicious user to obtain private information.
Successful exploitation of the vulnerability results in gaining unlimited access to private data.
4) Access bypass (CVE-ID: CVE-2011-2687)
The vulnerability allows a remote user to get access to node listings.The weakness exists due to abusing of restrictions imposed by the node_access system and affects only sites using content or forum access modules.
Successful exploitation of the vulnerability allows a malicious user to access node listings.
Remediation
Install update from vendor's website.