Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4EB403A2.4050606@redhat.com>
Date: Fri, 04 Nov 2011 09:24:18 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- Drupal (v6.x based) Views module
 - SQL injection due improper escaping of database parameters for certain
 filters / arguments (SA-CONTRIB-2011-052)

On 11/04/2011 04:49 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
>
>   a SQL injection flaw was found in the way the views module for the
> Drupal (v6.x based), open-source content-management platform, performed
> sanitization of the database parameters for certain filters / arguments
> on certain types of views with specific configuration of arguments. A
> remote attacker could provide a specially-crafted SQL query, which once
> processed by the Drupal system instance could lead to arbitrary SQL
> commands execution.
>
> References:
> [1] http://drupal.org/node/1329898
> [2] http://drupal.org/node/1329846
> [3] https://bugzilla.redhat.com/show_bug.cgi?id=751325
>
> Could you allocate a CVE id for this?
>
> Thank you && Regards, Jan.
> -- 
> Jan iankko Lieskovsky / Red Hat Security Response Team
Please use CVE-2011-4113 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.