* Advisory ID: DRUPAL-SA-CONTRIB-2011-022 * Project: cosign [1] (third-party module) * Version: 6.x * Date: 2011-MONTH-XX * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: SQL Injection
-------- DESCRIPTION ---------------------------------------------------------
Under certain conditions the module deletes uid 1 and then does an unparameterized db_query to insert a new uid 1.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer site configuration" and must be able to remotely manipulate the web server environmental variables REMOTE_USER and REMOTE_REALM.
-------- VERSIONS AFFECTED ---------------------------------------------------
* 6.x-1.4 * 6.x-1.5 * 6.x-1.6
Drupal core is not affected. If you do not use the contributed cosign [3] module, there is nothing you need to do.
-------- SOLUTION ------------------------------------------------------------
Install the latest version:
* If you use the Cosign module for Drupal 6.x, upgrade to version 6.x-1.7.
See also the cosign [4] project page.
-------- REPORTED BY ---------------------------------------------------------
* Steven Merrill [5]
-------- FIXED BY ------------------------------------------------------------
* Kris Steinhoff [6] the module maintainer
-------- CONTACT AND MORE INFORMATION ----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [7].
Learn more about the Drupal Security team and their policies [8], writing secure code for Drupal [9], and securing your site [10].
[1] http://drupal.org/project/cosign [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/project/cosign [4] http://drupal.org/project/cosign [5] http://drupal.org/user/218671 [6] http://drupal.org/user/388809/ [7] http://drupal.org/contact [8] http://drupal.org/security-team [9] http://drupal.org/writing-secure-code [10] http://drupal.org/security/secure-configuration