Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 24 Feb 2016 21:35:17 +0100
From: Pere Orga <pere@...a.cat>
To: oss-security@...ts.openwall.com
Cc: Drupal Security Team <security@...pal.org>
Subject: CVE requests for Drupal core (SA-CORE-2016-001)

Hi

Please can I have CVE IDs assigned to the following Drupal
vulnerabilities (see https://www.drupal.org/SA-CORE-2016-001):

File upload access bypass and denial of service (File module - Drupal 7 and 8)
Brute force amplification attacks via XML-RPC (XML-RPC server - Drupal 6 and 7)
Open redirect via path manipulation (Base system - Drupal 6, 7 and 8)
Form API ignores access restrictions on submit buttons (Form API - Drupal 6)
HTTP header injection using line breaks (Base system - Drupal 6)
Open redirect via double-encoded 'destination' parameter (Base system
- Drupal 6)
Reflected file download vulnerability (System module - Drupal 6 and 7)
Saving user accounts can sometimes grant the user all roles (User
module - Drupal 6 and 7)
Email address can be matched to an account (User module - Drupal 7 and 8)
Session data truncation can lead to unserialization of user provided
data (Base system - Drupal 6)


And also for the FileField contributed module:

FileField - Denial of Service
https://www.drupal.org/node/2674854



Regards
-- 
Pere Orga on behalf of the Drupal Security team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.