Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Fedora Core 11 FEDORA-2009-8184 (drupal-date)

Information

Severity

Severity

Low

Family

Family

Fedora Local Security Checks

CVSSv2 Base

CVSSv2 Base

2.1

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:H/Au:S/C:N/I:P/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to drupal-date announced via advisory FEDORA-2009-8184.

Insight

Insight

The Date API is available to be used by other modules and is not dependent on having CCK installed. The date module is a flexible date/time field type for the cck content module which requires the CCK content.module and the Date API module. Update Information: * Advisory ID: DRUPAL-SA-CONTRIB-2009-046 * Project: Date (third-party module) * Version: 6.x * Date: 2009-July-29 * Security risk: Moderately critical * Exploitable from: Remote * Vulnerability: Cross Site Scripting The Date module provides a date CCK field that can be added to any content type. The Date Tools module that is bundled with Date module does not properly escape user input when displaying labels for fields on a content type. A malicious user with the 'use date tools' permission of the Date Tools sub- module, or the 'administer content types' permission could attempt a cross site scripting (XSS) attack when creating a new content type, leading to the user gaining full administrative access. ChangeLog: * Wed Jul 29 2009 Jon Ciesla - 6.x.2.3-0 - Update to new version. - Fix for DRUPAL-SA-CONTRIB-2009-046. * Fri Jul 24 2009 Fedora Release Engineering - 6.x.2.0-2.rc4.2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild

Solution

Solution

Apply the appropriate updates. This update can be installed with the yum update program. Use su -c 'yum update drupal-date' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/. https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8184

Common Vulnerabilities and Exposures (CVE)