CVE-2015-2750
CVSS5.8
发布时间 :2017-09-13 12:29:00
修订时间 :2017-09-20 15:15:47
NMP    

[原文]Open redirect vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the "//" initial sequence.


[CNNVD]CNNVD数据暂缺。


[机译]Google 翻译(企业版):

- CVSS (基础分值)

CVSS分值: 5.8 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-601 [指向未可信站点的URL重定向(开放重定向)]

- CPE (受影响的平台与产品)

cpe:/a:drupal:drupal:7.10Drupal 7.10
cpe:/o:debian:debian_linux:8.0
cpe:/a:drupal:drupal:6.32
cpe:/a:drupal:drupal:6.30
cpe:/a:drupal:drupal:6.33
cpe:/a:drupal:drupal:6.0:devDrupal 6.0 dev
cpe:/a:drupal:drupal:6.34
cpe:/a:drupal:drupal:7.2Drupal 7.2
cpe:/a:drupal:drupal:7.0Drupal 7.0
cpe:/a:drupal:drupal:7.3Drupal 7.3
cpe:/a:drupal:drupal:7.6Drupal 7.6
cpe:/a:drupal:drupal:7.1Drupal 7.1
cpe:/a:drupal:drupal:7.4Drupal 7.4
cpe:/a:drupal:drupal:7.5Drupal 7.5
cpe:/a:drupal:drupal:7.21
cpe:/a:drupal:drupal:7.0:rc4Drupal 7.0 Release Candidate 4
cpe:/a:drupal:drupal:7.0:rc3Drupal 7.0 Release Candidate 3
cpe:/a:drupal:drupal:7.0:rc2Drupal 7.0 Release Candidate 2
cpe:/a:drupal:drupal:7.0:rc1Drupal 7.0 Release Candidate 1
cpe:/a:drupal:drupal:7.18Drupal 7.18
cpe:/a:drupal:drupal:7.11Drupal 7.11
cpe:/a:drupal:drupal:7.7Drupal 7.7
cpe:/a:drupal:drupal:7.15Drupal 7.15
cpe:/a:drupal:drupal:7.0:beta2Drupal 7.0 Beta 2
cpe:/a:drupal:drupal:7.12Drupal 7.12
cpe:/a:drupal:drupal:7.0:beta3Drupal 7.0 Beta 3
cpe:/a:drupal:drupal:7.13Drupal 7.13
cpe:/a:drupal:drupal:7.8Drupal 7.8
cpe:/a:drupal:drupal:7.0:beta1Drupal 7.0 Beta 1
cpe:/a:drupal:drupal:7.19
cpe:/a:drupal:drupal:7.16Drupal 7.16
cpe:/a:drupal:drupal:7.9Drupal 7.9
cpe:/a:drupal:drupal:7.17Drupal 7.17
cpe:/a:drupal:drupal:7.14Drupal 7.14
cpe:/a:drupal:drupal:6.19Drupal 6.19
cpe:/a:drupal:drupal:6.20Drupal 6.20
cpe:/a:drupal:drupal:7.32
cpe:/o:debian:debian_linux:9.0
cpe:/a:drupal:drupal:6.17Drupal 6.17
cpe:/a:drupal:drupal:7.29
cpe:/a:drupal:drupal:7.22
cpe:/a:drupal:drupal:6.10Drupal 6.10
cpe:/a:drupal:drupal:7.20
cpe:/a:drupal:drupal:7.26
cpe:/a:drupal:drupal:6.11Drupal 6.11
cpe:/a:drupal:drupal:7.23
cpe:/a:drupal:drupal:6.14Drupal 6.14
cpe:/a:drupal:drupal:7.24
cpe:/a:drupal:drupal:7.0:devDrupal 7.0 dev
cpe:/a:drupal:drupal:6.12Drupal 6.12
cpe:/a:drupal:drupal:6.15Drupal 6.15
cpe:/a:drupal:drupal:7.27
cpe:/a:drupal:drupal:6.18Drupal 6.18
cpe:/a:drupal:drupal:7.28
cpe:/a:drupal:drupal:6.13Drupal 6.13
cpe:/a:drupal:drupal:7.25
cpe:/a:drupal:drupal:6.16Drupal 6.16
cpe:/a:drupal:drupal:6.0Drupal 6.0
cpe:/a:drupal:drupal:6.0:rc1Drupal 6.0 release candidate 1
cpe:/a:drupal:drupal:6.3Drupal 6.3
cpe:/a:drupal:drupal:6.1Drupal 6.1
cpe:/a:drupal:drupal:6.4Drupal 6.4
cpe:/a:drupal:drupal:6.7Drupal 6.7
cpe:/a:drupal:drupal:6.2Drupal 6.2
cpe:/a:drupal:drupal:6.5Drupal 6.5
cpe:/a:drupal:drupal:6.6Drupal 6.6
cpe:/a:drupal:drupal:6.31
cpe:/a:drupal:drupal:6.0:rc4Drupal 6.0 release candidate 4
cpe:/a:drupal:drupal:6.0:rc3Drupal 6.0 release candidate 3
cpe:/a:drupal:drupal:6.0:rc2Drupal 6.0 release candidate 2
cpe:/a:drupal:drupal:7.0:alpha1Drupal 7.0 alpha1
cpe:/a:drupal:drupal:6.28
cpe:/a:drupal:drupal:7.33
cpe:/a:drupal:drupal:7.0:alpha5Drupal 7.0 alpha5
cpe:/a:drupal:drupal:7.30
cpe:/a:drupal:drupal:7.0:alpha4Drupal 7.0 alpha4
cpe:/a:drupal:drupal:6.21Drupal 6.21
cpe:/a:drupal:drupal:7.31
cpe:/a:drupal:drupal:7.0:alpha3Drupal 7.0 alpha3
cpe:/a:drupal:drupal:7.0:alpha2Drupal 7.0 alpha2
cpe:/a:drupal:drupal:6.0:beta3Drupal 6.0 beta3
cpe:/a:drupal:drupal:6.8Drupal 6.8
cpe:/a:drupal:drupal:6.22Drupal 6.22
cpe:/a:drupal:drupal:7.34
cpe:/a:drupal:drupal:6.0:beta4Drupal 6.0 beta4
cpe:/a:drupal:drupal:6.25Drupal 6.25
cpe:/a:drupal:drupal:7.0:alpha7Drupal 7.0 alpha7
cpe:/a:drupal:drupal:6.0:beta1Drupal 6.0 beta1
cpe:/a:drupal:drupal:7.0:alpha6Drupal 7.0 alpha6
cpe:/a:drupal:drupal:6.0:beta2Drupal 6.0 beta2
cpe:/a:drupal:drupal:6.9Drupal 6.9
cpe:/a:drupal:drupal:6.23Drupal 6.23
cpe:/a:drupal:drupal:6.26Drupal 6.26
cpe:/a:drupal:drupal:6.29
cpe:/a:drupal:drupal:6.24Drupal 6.24
cpe:/a:drupal:drupal:6.27Drupal 6.27

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2750
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2750
(官方数据源) NVD

- 其它链接及资源

http://cgit.drupalcode.org/drupal/commit/includes/common.inc?h=7.x&id=b44056d2f8e8c71d35c85ec5c2fb8f7c8a02d8a8
(VENDOR_ADVISORY)  CONFIRM  http://cgit.drupalcode.org/drupal/commit/includes/common.inc?h=7.x&id=b44056d2f8e8c71d35c85ec5c2fb8f7c8a02d8a8
http://cgit.drupalcode.org/drupal/commit/includes/menu.inc?h=6.x&id=8ffc5db3c0ab926f3d4b2cf8bc51714c8c0f3c93
(VENDOR_ADVISORY)  CONFIRM  http://cgit.drupalcode.org/drupal/commit/includes/menu.inc?h=6.x&id=8ffc5db3c0ab926f3d4b2cf8bc51714c8c0f3c93
http://www.debian.org/security/2015/dsa-3200
(VENDOR_ADVISORY)  DEBIAN  DSA-3200
http://www.openwall.com/lists/oss-security/2015/03/26/4
(PATCH)  MLIST  [oss-security] 20150326 Re: CVE requests for Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2015-001
http://www.securityfocus.com/bid/73219
(VENDOR_ADVISORY)  BID  73219
https://www.drupal.org/SA-CORE-2015-001
(VENDOR_ADVISORY)  CONFIRM  https://www.drupal.org/SA-CORE-2015-001

- 漏洞信息 (F131207)

Mandriva Linux Security Advisory 2015-181 (PacketStormID:F131207)
2015-03-31 00:00:00
Mandriva  mandriva.com
advisory,vulnerability
linux,mandriva
CVE-2014-2983,CVE-2014-3704,CVE-2014-5019,CVE-2014-5020,CVE-2014-5021,CVE-2014-5022,CVE-2014-9015,CVE-2014-9016,CVE-2015-2559,CVE-2015-2749,CVE-2015-2750
[点击下载]

Mandriva Linux Security Advisory 2015-181 - Updated drupal packages fix multiple security vulnerabilities.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:181
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : drupal
 Date    : March 30, 2015
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated drupal packages fix security vulnerabilities:
 
 An information disclosure vulnerability was discovered in Drupal
 before 7.27. When pages are cached for anonymous users, form state
 may leak between anonymous users. Sensitive or private information
 recorded for one anonymous user could thus be disclosed to other
 users interacting with the same form at the same time (CVE-2014-2983).
 
 Multiple security issues in Drupal before 7.29, including a denial
 of service issue, an access bypass issue in the File module, and
 multiple cross-site scripting issues (CVE-2014-5019, CVE-2014-5020,
 CVE-2014-5021, CVE-2014-5022).
 
 A denial of service issue exists in Drupal before 7.31, due to XML
 entity expansion in a publicly accessible XML-RPC endpoint.
 
 An SQL Injection issue exists in Drupal before 7.32 due to the way
 the Drupal core handles prepared statements. A malicious user can
 inject arbitrary SQL queries, and thereby completely control the
 Drupal site. This vulnerability can be exploited by remote attackers
 without any kind of authentication required (CVE-2014-3704).
 
 Aaron Averill discovered that a specially crafted request can give a
 user access to another user's session, allowing an attacker to hijack
 a random session (CVE-2014-9015).
 
 Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered
 that the password hashing API allows an attacker to send specially
 crafted requests resulting in CPU and memory exhaustion. This may lead
 to the site becoming unavailable or unresponsive (denial of service)
 (CVE-2014-9016). anonymous users (CVE-2014-9016).
 
 Password reset URLs can be forged under certain circumstances, allowing
 an attacker to gain access to another user's account without knowing
 the account's password (CVE-2015-2559).
 
 Under certain circumstances, malicious users can construct a URL
 that will trick users into being redirected to a 3rd party website,
 thereby exposing the users to potential social engineering attacks. In
 addition, several URL-related API functions in Drupal 6 and 7 can be
 tricked into passing through external URLs when not intending to,
 potentially leading to additional open redirect vulnerabilities
 (CVE-2015-2749, CVE-2015-2750).
 
 The drupal package has been updated to version 7.35 to fix this
 issue and other bugs.  See the upstream advisory and release notes
 for more details.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2983
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3704
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5019
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5020
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5021
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5022
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9015
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9016
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2559
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2749
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2750
 http://advisories.mageia.org/MGASA-2014-0322.html
 http://advisories.mageia.org/MGASA-2014-0329.html
 http://advisories.mageia.org/MGASA-2014-0423.html
 http://advisories.mageia.org/MGASA-2014-0492.html
 http://advisories.mageia.org/MGASA-2015-0121.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 8181a2b7b02a918304059853aa485f98  mbs1/x86_64/drupal-7.35-1.mbs1.noarch.rpm
 68e0c245147c7044c5ea3c55a0d3951a  mbs1/x86_64/drupal-mysql-7.35-1.mbs1.noarch.rpm
 bde1b563b01f56120c032086167239a4  mbs1/x86_64/drupal-postgresql-7.35-1.mbs1.noarch.rpm
 2e9f67e53b0472ae175b9853a05c7af2  mbs1/x86_64/drupal-sqlite-7.35-1.mbs1.noarch.rpm 
 f9519474702357f27e4bb03557064d9d  mbs1/SRPMS/drupal-7.35-1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVGTXBmqjQ0CJFipgRAuMOAJ9CQl8dyrZJuFJWL9Y/MI9x3IcHtQCfc/s3
7fYwyk+8ldbJhjqKI46bLHk=
=3jEr
-----END PGP SIGNATURE-----
    
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站