[Security-news] SA-CONTRIB-2010-098 - Memcache - Multiple vulnerabilities
security-news at drupal.org
security-news at drupal.org
Thu Sep 30 00:44:40 UTC 2010
* Advisory ID: DRUPAL-SA-CONTRIB-2010-098
* Project: memcache (third-party module)
* Version: 5.x, 6.x
* Date: 2010-September-29
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Access bypass, Cross-Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Memcache project [1] provides an alternative cache backend which works
with memcached program to speed up high traffic sites.
The memcache backend caches the current $user object a little too
aggressively, which can lead to a role change not being recognized until the
user logs in again.
The memcache_admin module does not sanitize some of the user supplied data
before displaying it, leading to a Cross Site Scripting (XSS [2])
vulnerability which can be used by a malicious user to gain full
administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Memcache for Drupal 6.x versions prior to 6.x-1.6
* Memcache for Drupal 5.x versions prior to 5.x-1.10
Drupal core is not affected. If you do not use the contributed Memcache [3]
backend there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Memcache for Drupal 6.x, upgrade to Memcache 6.x-1.6 [4]
* If you use the Memcache for Drupal 5.x, upgrade to Memcache 5.x-2.10 [5]
See also the Memcache project page [6].
-------- REPORTED BY
---------------------------------------------------------
* Justin James Grevich (jgrevich) [7]
* Moshe Weitzman [8], of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Robert Douglass (robertDouglass) [9], module maintainer
* Moshe Weitzman [10], of the Drupal Security Team
-------- CONTACT
-------------------------------------------------------------
The Drupal security team [11] can be reached at security at drupal.org or via
the form at http://drupal.org/contact [12].
[1] http://drupal.org/project/memcache
[2] http://en.wikipedia.org/wiki/Cross-site_scripting
[3] http://drupal.org/project/memcache
[4] http://drupal.org/node/926474
[5] http://drupal.org/node/926478
[6] http://drupal.org/project/memcache
[7] http://drupal.org/user/355156
[8] http://drupal.org/user/31977
[9] http://drupal.org/user/5449
[10] http://drupal.org/user/23
[11] http://drupal.org/security-team
[12] http://drupal.org/contact
More information about the Security-news
mailing list