Quantcast
Channel: iTWire - Entertainment
Viewing all articles
Browse latest Browse all 4710

Drupal fixes highly critical flaw, but offers no details

$
0
0
Drupal fixes highly critical flaw, but offers no details

The team behind the open source content management system Drupal have released patches for what is said to be a highly critical vulnerability in versions 7 and 8 of the software that can be exploited remotely.

But no technical details of the bug have been provided apart from this statement: "A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x.

"This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised."

Drupal is run by some 450 Australian Government websites using a custom version known as govCMS. Drupal also runs the White House website.

{loadposition sam08}The advisory mentioned above links to a FAQ but even there the Drupal Security Team dances all around the issue and does not mention specifics.

In response to a question "How dangerous is this issue?" on the FAQ, the Drupal Security Team says: "Drupal security advisories include a risk score based on the NIST Common Misuse Scoring System. This helps give an objective sense of the risk of different issues. The risk of SA-CORE-2018-002 is scored 21/25 (Highly Critical)."

To get an idea of what the risk score is all about, one has to go to a third Web page.

It is only in the comments on the FAQ page that some idea can be obtained about the vector for this flaw. One commenter said the flaw affected the Bootstrap system. A second said: "The exploit is done via maliciously formed cookies, POST requests or query strings."


Viewing all articles
Browse latest Browse all 4710

Trending Articles