Voting starts in March for the Drupal Association Board election.
- Advisory ID: DRUPAL-SA-CORE-2009-003
- Project: Drupal core
- Versions: 6.x
- Date: 2009-February-25
- Security risk: Highly Critical
- Exploitable from: Remote
- Vulnerability: Local file inclusion on Windows
This vulnerability exists on Windows, regardless of the type of webserver (Apache, IIS) used.
The Drupal theme system takes URL arguments into account when selecting a template file to use for page rendering. While doing so, it doesn't take into account how Windows arrives at a canonicalized path. This enables malicious users to include files, readable by the webserver and located on the same volume as Drupal, and to execute PHP contained within those files. For example: If a site has uploads enabled, an attacker may upload a file containing PHP code and cause it to be included on a subsequent request by manipulating the URL used to access the site.
Important note: An attacker may also be able to inject PHP code into webserver logs and subsequently include the log file, leading to code execution even if no upload functionality is enabled on the site.
- Drupal 6.x before version 6.10
Install the latest version:
- If you are running Drupal 6.x then upgrade to Drupal 6.10.
If you are unable to upgrade immediately, you can apply a patch to secure your installation until you are able to do a proper upgrade. The patch fixes the security vulnerability, but does not contain other fixes which were released in Drupal 6.10.
- To patch Drupal 6.9 use SA-CORE-2009-003-6.9.patch.
Bogdan Calin (www.acunetix.com)
The security team for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.