View online: https://www.drupal.org/node/2336259
* Advisory ID: DRUPAL-SA-CONTRIB-2014-085
* Project: Ubercart [1] (third-party module)
* Version: 7.x
* Date: 2014-September-10
* Security risk: 10/25 ( Moderately Critical)
AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:Default [2]
* Vulnerability: Information Disclosure
-------- DESCRIPTION
---------------------------------------------------------
The Ubercart module for Drupal provides a shopping cart and e-commerce
features for Drupal.
The per-user order history view is not properly protected.
This vulnerability is mitigated by the fact that an attacker must have an
account with the "view own orders" permission and can only view order IDs,
dates, statuses and totals with the default configuration.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Ubercart 7.x-3.x versions prior to 7.x-3.7.
Drupal core is not affected. If you do not use the contributed Ubercart [4]
module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Ubercart module for Drupal 7.x, upgrade to Ubercart
7.x-3.7
[5]
Also see the Ubercart [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Silviu CHINGARU [7]
-------- FIXED BY
------------------------------------------------------------
* Silviu CHINGARU [8]
* Dave Long [9] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12],
writing secure code for Drupal [13], and
securing your site [14].
[1] https://www.drupal.org/project/ubercart
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/ubercart
[5] https://www.drupal.org/node/2336109
[6] https://www.drupal.org/project/ubercart
[7] https://www.drupal.org/user/352564
[8] https://www.drupal.org/user/352564
[9] https://www.drupal.org/user/246492
[10] https://www.drupal.org/u/greggles
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
View online: https://www.drupal.org/node/2332169
* Advisory ID: DRUPAL-SA-CONTRIB-2014-84
* Project: Avatar Uploader [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2014-08-20
* Security risk: 16/25 ( Critical)
AC:Basic/A:User/CI:All/II:None/E:Exploit/TD:100 [2]
* Vulnerability: Information Disclosure
-------- DESCRIPTION
---------------------------------------------------------
The Avatar Uploader enables you to upload user pictures in a user-friendly
way, like Quora and Facebook.
The module doesn't sufficiently check the picture path when a user crops the
picture in the uploader panel allowing a malicious user to make specially
crafted requests to obtain sensitive server files that are readable by the
webserver user.
This vulnerability is mitigated by the fact that an attacker must know or
guess the relative path out of the temporary directory and to the sensitive
files.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Avatar_Uploader 6.x-1.x versions prior to 6.x-1.2
* Avatar_Uploader 7.x-1.x versions prior to 7.x-1.0-beta5
Drupal core is not affected. If you do not use the contributed Avatar
Uploader [4] module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Avatar_Uploader module for Drupal 6.x, upgrade to
Avatar_Uploader 6.x-1.2 [5]
* If you use the Avatar_Uploader module for Drupal 7.x, upgrade to
Avatar_Uploader 7.x-1.0-beta6 [6]
Also see the Avatar Uploader [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Damien Norris [8]
-------- FIXED BY
------------------------------------------------------------
* Damien Norris [9]
* Greg Knaddison [10] of the Drupal Security Team
* Robbin Zhao [11] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [12] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [13].
Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and securing your site [16].
[1] https://www.drupal.org/project/avatar-uploader
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/avatar-uploader
[5] https://www.drupal.org/node/2330763
[6] https://www.drupal.org/node/2330759
[7] https://www.drupal.org/project/avatar-uploader
[8] https://www.drupal.org/user/97688
[9] https://www.drupal.org/user/97688
[10] https://www.drupal.org/user/36762
[11] https://www.drupal.org/user/616818
[12] https://www.drupal.org/user/36762
[13] https://www.drupal.org/contact
[14] https://www.drupal.org/security-team
[15] https://www.drupal.org/writing-secure-code
[16] https://www.drupal.org/security/secure-configuration