#VU429 Cross-site request forgery in Drupal


Published: 2016-09-14

Vulnerability identifier: #VU429

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-6660

CWE-ID: CWE-352

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Drupal
Web applications / CMS

Vendor: Drupal

Description
The vulnerability allows a remote user to perform cross-site request forgery.
The weakness is caused by unsufficient input checking. Attackers can upload temporary malicious files under the account of another user.
Successful exploitation of this vulnerability may result in CSRF conducting.

Mitigation
Update 6.x to 6.37.
https://www.drupal.org/drupal-6.37-release-notes
Update 7.x to 7.39.
https://www.drupal.org/drupal-7.39-release-notes

Vulnerable software versions

Drupal: 7.1 - 7.38, 6.0 - 6.36


External links
http://www.drupal.org/SA-CORE-2015-003


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability