Drupal 4.6.6 / 4.5.8 fixes session fixation issue

Credit: Uwe Hermann
Risk: Low
Local: No
Remote: Yes
CWE: CWE-287

CVSS Base Score: 5.1/10
Impact Subscore: 6.4/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

------------------------------------------------------------------------ ---- Drupal security advisory DRUPAL-SA-2006-003 ------------------------------------------------------------------------ ---- Advisory ID: DRUPAL-SA-2006-003 Project: Drupal core Date: 2006-03-13 Security risk: less critical Impact: hijacking Where: from remote Vulnerability: session fixation attack ------------------------------------------------------------------------ ---- Description ----------- If someone creates a clever enough URL and convinces you to click on it, and you later log in but you do not log off then the attacker may be able to impersonate you. Versions affected ----------------- All Drupal versions before 4.6.6. Solution -------- The fix to this issue requires PHP 4.3.2 or higher, which is higher than the minimum requirements for the Drupal 4.5.x branch. If you are still running an older version of PHP, you must upgrade it or this issue will not be fixed. If you are running Drupal 4.5.x then upgrade to Drupal 4.5.8. If you are running Drupal 4.6.x then upgrade to Drupal 4.6.6. Reported by ----------- Markus Petrux Contact ------- The security contact for Drupal can be reached at security (at) drupal (dot) org [email concealed] or using the form at http://drupal.org/contact. More information is available from http://drupal.org/security or from our security RSS feed http://drupal.org/security/rss.xml. // Uwe Hermann, on behalf of the Drupal Security Team. -- Uwe Hermann http://www.hermann-uwe.de http://www.it-services-uh.de | http://www.crazy-hacks.org http://www.holsham-traders.de | http://www.unmaintained-free-software.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFEFiQHXdVoV3jWIbQRAiXMAJ0Yw2A5+Qy5OR6axr+lw5qji4JhYwCbB6sx ZSSuZE8vP3+SZTGk8ZQo8gk= =QyuT -----END PGP SIGNATURE-----

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com


Back to Top