webmaster, seo adn smo

Graphviz Filter - arbitrary code execution

dev1961's picture

* Advisory ID: DRUPAL-SA-CONTRIB-2010-016
* Project: Graphviz Filter (third-party module)
* Version: 6.x, 5.x
* Date: 2010 February 10
* Security risk: Highly critical
* Exploitable from: Remote
* Vulnerability: Arbitrary code execution


Graphviz Filter does not properly filter user input via @command option in
node body, leading to a possible Arbitrary Shell Code Execution [1]
vulnerability. This vulnerability allows a remote attacker with the ability
to create content using a Graphviz input filter to execute an arbitrary shell
code on affected system.

* Graphviz 6.x-1.x prior to 6.x-1.6
* Graphviz 5.x-1.x prior to 5.x-1.3

Drupal core is not affected. If you do not use the contributed Graphviz
Filter module, there is nothing you need to do.
-------- SOLUTION

Install the latest version:
* If you use Graphviz Filter 6.x-1.x, upgrade to Graphviz Filter 6.x-1.6
* If you use Graphviz Filter 5.x-1.x, upgrade to Graphviz Filter 5.x-1.3

See also the Graphviz Filter project page [4].
-------- REPORTED BY

* Clemens Tolboom [5].

-------- FIXED BY

* Karim Ratib [6], the Graphviz Filter module maintainer.

-------- CONTACT

The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.

[1] http://en.wikipedia.org/wiki/Arbitrary_code_execution
[2] http://drupal.org/node/710798
[3] http://drupal.org/node/710804
[4] http://drupal.org/project/graphviz_filter
[5] http://drupal.org/user/125814
[6] http://drupal.org/user/48424

Security-news mailing list