Drupal 6.x before 6.34 and 7.x before 7.34 allows remote attackers to hijack sessions via a crafted request, as demonstrated by a crafted request to a server that supports both HTTP and HTTPS sessions.
References
Link | Resource |
---|---|
http://secunia.com/advisories/59164 | Third Party Advisory |
http://secunia.com/advisories/59814 | Third Party Advisory |
http://www.debian.org/security/2014/dsa-3075 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/11/20/21 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/11/20/3 | Mailing List Third Party Advisory |
https://www.drupal.org/SA-CORE-2014-006 | Vendor Advisory |
http://secunia.com/advisories/59164 | Third Party Advisory |
http://secunia.com/advisories/59814 | Third Party Advisory |
http://www.debian.org/security/2014/dsa-3075 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/11/20/21 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/11/20/3 | Mailing List Third Party Advisory |
https://www.drupal.org/SA-CORE-2014-006 | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/59164 - Third Party Advisory | |
References | () http://secunia.com/advisories/59814 - Third Party Advisory | |
References | () http://www.debian.org/security/2014/dsa-3075 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2014/11/20/21 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2014/11/20/3 - Mailing List, Third Party Advisory | |
References | () https://www.drupal.org/SA-CORE-2014-006 - Vendor Advisory |
Information
Published : 2014-11-24 15:59
Updated : 2024-11-21 02:20
NVD link : CVE-2014-9015
Mitre link : CVE-2014-9015
CVE.ORG link : CVE-2014-9015
JSON object : View
Products Affected
debian
- debian_linux
drupal
- drupal
CWE
CWE-264
Permissions, Privileges, and Access Controls