what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Drupal UC PayDutchGroup / WeDeal Payment / Multisite Search Disclosure

Drupal UC PayDutchGroup / WeDeal Payment / Multisite Search Disclosure
Posted Mar 7, 2012
Authored by Justin C. Klein Keane, Rolf Meijer | Site drupal.org

UC PayDutchGroup / WeDeal payment integrates the PayDutchGroup / WeDeal payment gateway with Ubercart. The module exposes account credentials for the store's PayDutchGroup account under certain circumstances allowing a malicious user to login to the PayDutchGroup site as the store owner and manage the store owner's account. The vulnerability is mitigated by an attacker needing to gain an account with the ability to checkout of the store. Multisite Search allows you to index and search content from all sites in a Multisite configuration. The module doesn't sufficiently escape user input when constructing queries. The vulnerability is mitigated by the fact that in order to execute arbitrary sql injection malicious users must have the ability to administer multisite search.

tags | advisory, arbitrary, sql injection
SHA-256 | 821d0c201eeac6fac0f5db639e8b855cdeb11ae6a13a35cc6a819fb54a37c7ce

Drupal UC PayDutchGroup / WeDeal Payment / Multisite Search Disclosure

Change Mirror Download
  * Advisory ID: DRUPAL-SA-CONTRIB-2012-031
* Projects: UC PayDutchGroup / WeDeal payment [1], Multisite Search [2]
(third-party modules)
* Version: 6.x
* Date: 2012-March-7
* Security risk: Critical [3]
* Exploitable from: Remote
* Vulnerability: Information Disclosure

-------- DESCRIPTION
---------------------------------------------------------

UC PayDutchGroup / WeDeal payment [4] integrates the PayDutchGroup / WeDeal
payment gateway with Ubercart. The module exposes account credentials for the
store's PayDutchGroup account under certain circumstances allowing a
malicious user to login to the PayDutchGroup site as the store owner and
manage the store owner's account. The vulnerability is mitigated by an
attacker needing to gain an account with the ability to checkout of the
store.

Multisite Search [5] allows you to index and search content from all sites in
a Multisite configuration. The module doesn't sufficiently escape user input
when constructing queries. The vulnerability is mitigated by the fact that in
order to execute arbitrary sql injection malicious users must have the
ability to administer multisite search.
-------- VERSIONS AFFECTED
---------------------------------------------------


All versions of UC PayDutchGroup / WeDeal payment are affected by
vulnerabilities.

All versions of Multisite Search payment are affected by vulnerabilities.

Drupal core is not affected. If you do not use one of the contributed modules
listed above, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Users of thes modules are encouraged to disable the modules and search for
similar alternatives. Users of the module who wish to take over
maintainership should post patches to the issue queue to fix the security
issues and request maintenance following the Unsupported project process [6]

-------- REPORTED BY
---------------------------------------------------------

* UC PayDutchGroup / WeDeal payment issue reported by Rolf Meijer [7]
* Multisite Search issue reported by Justin Klein Keane [8]

-------- FIXED BY
------------------------------------------------------------

No fixes created.

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [9].

Learn more about the Drupal Security team and their policies [10], writing
secure code for Drupal [11], and securing your site [12].


[1] http://drupal.org/project/uc_paydutch
[2] http://drupal.org/project/multisite_search
[3] http://drupal.org/security-team/risk-levels
[4] http://drupal.org/project/uc_paydutch
[5] http://drupal.org/project/multisite_search
[6] http://drupal.org/node/251466
[7] http://drupal.org/user/358052
[8] http://drupal.org/user/302225
[9] http://drupal.org/contact
[10] http://drupal.org/security-team
[11] http://drupal.org/writing-secure-code
[12] http://drupal.org/security/secure-configuration

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close