* Advisory ID: DRUPAL-SA-CONTRIB-2010-016 * Project: Graphviz Filter (third-party module) * Version: 6.x, 5.x * Date: 2010 February 10 * Security risk: Highly critical * Exploitable from: Remote * Vulnerability: Arbitrary code execution
-------- DESCRIPTION ---------------------------------------------------------
Graphviz Filter does not properly filter user input via @command option in node body, leading to a possible Arbitrary Shell Code Execution [1] vulnerability. This vulnerability allows a remote attacker with the ability to create content using a Graphviz input filter to execute an arbitrary shell code on affected system. -------- VERSIONS AFFECTED ---------------------------------------------------
* Graphviz 6.x-1.x prior to 6.x-1.6 * Graphviz 5.x-1.x prior to 5.x-1.3
Drupal core is not affected. If you do not use the contributed Graphviz Filter module, there is nothing you need to do. -------- SOLUTION ------------------------------------------------------------
Install the latest version: * If you use Graphviz Filter 6.x-1.x, upgrade to Graphviz Filter 6.x-1.6 [2]. * If you use Graphviz Filter 5.x-1.x, upgrade to Graphviz Filter 5.x-1.3 [3].
See also the Graphviz Filter project page [4]. -------- REPORTED BY ---------------------------------------------------------
* Clemens Tolboom [5].
-------- FIXED BY ------------------------------------------------------------
* Karim Ratib [6], the Graphviz Filter module maintainer.
-------- CONTACT -------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Arbitrary_code_execution [2] http://drupal.org/node/710798 [3] http://drupal.org/node/710804 [4] http://drupal.org/project/graphviz_filter [5] http://drupal.org/user/125814 [6] http://drupal.org/user/48424