---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Drupal Virtual Hosts Local File Inclusion SECUNIA ADVISORY ID: SA32389 VERIFY ADVISORY: http://secunia.com/advisories/32389/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: Drupal 5.x http://secunia.com/advisories/product/13378/ Drupal 6.x http://secunia.com/advisories/product/17839/ DESCRIPTION: A vulnerability has been reported in Drupal, which can potentially be exploited by malicious, local users to gain escalated privileges. Input passed to unspecified parameters is not properly verified before being used to include files. This can be exploited to include specially named files from local resources and potentially escalate privileges. Successful exploitation requires that the web server is configured to use virtual hosts. The vulnerability is reported in all 5.x versions prior to 5.12 and all 6.x versions prior to 6.6. SOLUTION: Update to version 5.12 or 6.6. Apply the vendor's official patches to versions 5.11 or 6.5: Drupal 5.11: http://drupal.org/files/sa-2008-067/SA-2008-067-5.11.patch Drupal 6.5: http://drupal.org/files/sa-2008-067/SA-2008-067-6.5.patch PROVIDED AND/OR DISCOVERED BY: The vendor credits Anthony Ferrara. ORIGINAL ADVISORY: DRUPAL-SA-2008-067: http://drupal.org/node/324824 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------