Advertisement






Drupal 4.6.6 / 4.5.8 fixes session fixation issue

CVE Category Price Severity
CVE-XXXX-XXXX CWE-XXXX Unknown Medium
Author Risk Exploitation Type Date
Unknown High Remote 2006-03-23
CPE
cpe:cpe:/a:drupal:drupal:4.6.6:
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 0 0

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006030072

Below is a copy:

------------------------------------------------------------------------
----
Drupal security advisory                                  DRUPAL-SA-2006-003
------------------------------------------------------------------------
----
Advisory ID:    DRUPAL-SA-2006-003
Project:        Drupal core
Date:           2006-03-13
Security risk:  less critical
Impact:         hijacking
Where:          from remote
Vulnerability:  session fixation attack
------------------------------------------------------------------------
----

Description
-----------
If someone creates a clever enough URL and convinces you to click on it, and
you later log in but you do not log off then the attacker may be able to
impersonate you.

Versions affected
-----------------
All Drupal versions before 4.6.6.

Solution
--------
The fix to this issue requires PHP 4.3.2 or higher, which is higher than the
minimum requirements for the Drupal 4.5.x branch. If you are still running 
an older version of PHP, you must upgrade it or this issue will not be
fixed.

If you are running Drupal 4.5.x then upgrade to Drupal 4.5.8.
If you are running Drupal 4.6.x then upgrade to Drupal 4.6.6.

Reported by
-----------
Markus Petrux

Contact
-------
The security contact for Drupal can be reached at security (at) drupal (dot) org [email concealed]
or using the form at http://drupal.org/contact.
More information is available from http://drupal.org/security or from
our security RSS feed http://drupal.org/security/rss.xml.

// Uwe Hermann, on behalf of the Drupal Security Team.
-- 
Uwe Hermann 
http://www.hermann-uwe.de
http://www.it-services-uh.de  | http://www.crazy-hacks.org 
http://www.holsham-traders.de | http://www.unmaintained-free-software.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFEFiQHXdVoV3jWIbQRAiXMAJ0Yw2A5+Qy5OR6axr+lw5qji4JhYwCbB6sx
ZSSuZE8vP3+SZTGk8ZQo8gk=
=QyuT
-----END PGP SIGNATURE-----

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum