SB2015061806 - Fedora EPEL 7 update for drupal7
Published: June 18, 2015 Updated: April 24, 2025
Security Bulletin ID
SB2015061806
Severity
Low
Patch available
YES
Number of vulnerabilities
4
Exploitation vector
Remote access
Highest impact
Information disclosure
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2015-3231)
The vulnerability allows a non-privileged user to get access to user's private information.The weakness is caused by cache system sites. Private cache of one of the users may be seen by other non-privileged users.
Successful exploitation of this vulnerability will allow a malicious user to obtain valid user's personal data.
2) Open redirect (CVE-ID: CVE-2015-3232)
The vulnerability allows a malicious user to perform potential social engineering attacks.The weakness exists due to using of "destinations" query string parameter in malicious purposes. A remote attacker can trick the valid user into using of specially constructed URL for redirecting a victim to a 3rd party website.
Successful exploitation of this vulnerability may result in potential social engineering attacks.
3) Open redirect (CVE-ID: CVE-2015-3233)
The vulnerability allows attackers to obtain potentially sensitive information.The weakness exists due to unproper functionality of Overlay module that unsufficiently checks the URLs. The module also shows administrative page in the browser instead of its substitution.
Successful exploitation of this vulnerability may result in obtaining potentially sensitive data.
4) Impersonation (CVE-ID: CVE-2015-3234)
The vulnerability allows attackers to hijack valid users' accounts.The weakness is caused by malicious user's possibility to log in as another user (even administrator) on the site that may provide him access to data.
Successful exploitation of this vulnerability may result in hijacking of target users' accounts.
Remediation
Install update from vendor's website.