Release date: 2012-05-10
Updated on:
Affected Systems:
Drupal 7.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 53454
Drupal is an open source content management platform.
The path leakage vulnerability exists in Drupal versions earlier than 7.14, and the index of the installation path is leaked through the error message. the q [] parameter of php, des/bootstrap. the request_path function in inc allows remote attackers to obtain sensitive information.
<* Source: Jean Pascal Pereira
Link: http://www.securityfocus.com/archive/1/522662
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Http: // localhost /? Q [] = x
-------------------------------------
Hotfix:
Search:
$ Path = trim ($ path ,'/');
And add the following line above:
If (is_array ($ path) {die ();}
-------------------------------------
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Drupal
------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.drupal.org/