[Security-news] SA-CONTRIB-2015-048 - Avatar Uploader - Arbitrary PHP code execution

security-news at drupal.org security-news at drupal.org
Wed Feb 18 18:49:38 UTC 2015


View online: https://www.drupal.org/node/2428793

   * Advisory ID: DRUPAL-SA-CONTRIB-2015-048
   * Project: Avatar Uploader [1]     (third-party module)
   * Version: 6.x, 7.x
   * Date: 2015-February-18
   * Security risk: 16/25 ( Critical)
     AC:None/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
   * Vulnerability: Arbitrary PHP code execution

-------- DESCRIPTION
---------------------------------------------------------

Avatar Uploader module provides an alternative way to upload user pictures.

The module doesn't sufficiently enforce file extensions when an avatar is
uploaded, allowing users to bypass Drupal's normal file upload protections to
install malicious HTML or executable code to the server.

This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "upload avatar file", and that the fix for SA-2006-006 -
Drupal Core - Execution of arbitrary files in certain Apache configurations
[3] should prevent code execution in typical Apache configurations.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [4] will be requested, and added upon issuance, in
     accordance
            with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * Avatar Uploader 6.x-1.x versions prior to 6.x-1.3.

Drupal core is not affected. If you do not use the contributed Avatar
Uploader [5] module,
       there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the Avatar Uploader module for Drupal 6.x, upgrade to Avatar
     Uploader 6.x-1.3 [6]

Also see the Avatar Uploader [7] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Liran Tal [8]

-------- FIXED BY
------------------------------------------------------------

   * Robbin Gaoxin Zhao [9], the module maintainer

-------- COORDINATED BY
------------------------------------------------------

   * Pere Orga [10] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].

Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and  securing your site [14].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]


[1] https://www.drupal.org/project/avatar-uploader
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/node/65409
[4] http://cve.mitre.org/
[5] https://www.drupal.org/project/avatar-uploader
[6] https://www.drupal.org/node/2427069
[7] https://www.drupal.org/project/avatar-uploader
[8] https://www.drupal.org/user/1315712
[9] https://www.drupal.org/user/616818
[10] https://www.drupal.org/user/2301194
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity



More information about the Security-news mailing list