View online: http://drupal.org/node/1679442
* Advisory ID: DRUPAL-SA-CONTRIB-2012-108 * Project: Drag & Drop Gallery [1] (third-party module) * Version: 6.x * Date: 2012-July-11 * Security risk: Highly critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Access bypass, Cross Site Request Forgery, SQL Injection, Arbitrary PHP code execution
-------- DESCRIPTION ---------------------------------------------------------
/Important note: Most of the vulnerabilities discussed below can be exploited when the Drag & Drop Gallery module is disabled on a Drupal site. See Solution below for details./
The Drag & Drop Gallery creates a gallery node type that allows you add images to the gallery by dragging and dropping images from your local file system.
The file handling the actual uploads contains a number of bugs. The combination of these bugs allows unauthenticated user to upload PHP-executable files to arbitrary locations. A script exploiting this vulnerability has been published.
A succesful exploit requires the webserver to be configured in such a way that it either ignores the .htaccess in the files directory or is able to write to certain web-accessible directories that do not have this .htaccess protection.
The module also contains other vulnerabilities such as Cross site scripting (XSS), SQL-injection, Access bypass and Cross site request forgery (CSRF). Though less severe, these vulnerabilities can also be used to get administrator level access to the site.
CVE: Requested
-------- VERSIONS AFFECTED ---------------------------------------------------
* Drag & Drop Gallery 6.x versions
Drupal core is not affected. If you do not use the contributed Drag & Drop Gallery [3] module, there is nothing you need to do.
-------- SOLUTION ------------------------------------------------------------
There is no version of the module that fixes these vulnerabilites. Disable *and remove* the module from your system.
Important note: Most vulnerabilities can still be exploited when the module is disabled.
Please join the issue in the public queue [4] to fix the problems.
Also see the Drag & Drop Gallery [5] project page.
-------- REPORTED BY ---------------------------------------------------------
The vulnerability was publicly disclosed. An exploit exists.
-------- CONTACT AND MORE INFORMATION ----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [6].
Learn more about the Drupal Security team and their policies [7], writing secure code for Drupal [8], and securing your site [9].
[1] http://drupal.org/project/dragdrop_gallery [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/project/dragdrop_gallery [4] http://drupal.org/node/1679444 [5] http://drupal.org/project/dragdrop_gallery [6] http://drupal.org/contact [7] http://drupal.org/security-team [8] http://drupal.org/writing-secure-code [9] http://drupal.org/security/secure-configuration