---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Drupal Project Issue Tracking Module Multiple Vulnerabilities SECUNIA ADVISORY ID: SA23887 VERIFY ADVISORY: http://secunia.com/advisories/23887/ CRITICAL: Less critical IMPACT: Security Bypass, Cross Site Scripting, Manipulation of data, Exposure of sensitive information, System access WHERE: >From remote SOFTWARE: Drupal Project issue tracking Module 4.x http://secunia.com/product/12913/ DESCRIPTION: Some vulnerabilities have been reported in the Project issue tracking module for Drupal, which can be exploited by malicious users to bypass certain security restrictions, disclose sensitive information, manipulate data, compromise vulnerable systems or conduct script insertion attacks. 1) An unspecified error in assembling permissions causes users to get full access to all issues. Successful exploitation requires valid user credentials and that the user has the "Access project issues" permission. 2) An unspecified error in assembling permissions causes users to be able to download confidential or private files. Successful exploitation requires valid user credentials, that the user has the "Access project issues" permission, that the site is configured to use the private download method, and that the user can guess the filenames. 3) An unspecified script fails to validate the extension(s) of an uploaded file. This can be exploited to upload files with arbitrary extensions (e.g. ".php" or ".php.pps") and execute arbitrary PHP code on the server. Successful exploitation requires valid user credentials, that the user has the "Create project issues" permission, and that the Apache server configuration disables "FileInfo" overrides in .htaccess files. 4) For more information: SA23908 The vulnerabilities are reported in version 4.7.x-2.1, 4.7.x-1.1, 4.7.0 (from before the new release system) and in 4.6.x (when the product was a part of the Project module). SOLUTION: Update to version 4.7.x-2.2 or 4.7.x-1.2. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1+2) Derek Wright a.k.a dww 3) Heine Deelstra 4) Brandon Bergren a.k.a bdragon ORIGINAL ADVISORY: DRUPAL-SA-2007-004: http://drupal.org/node/112146 OTHER REFERENCES: SA23908: http://secunia.com/advisories/23908/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------