Drupal Core Security Advisory 20140417

We encourage users to post events happening in the community to the community events group on https://www.drupal.org.
kpyan8s's picture

According to Drupal Community, Drupal 7.27 and 6.31 were released on April 17, 2014 which contain fixes for security vulnerabilities.

Sites are urged to upgrade immediately after reading this security announcement.

Drupal's form API has built-in support for temporary storage of form state, for example user input. This is often used on multi-step forms, and is required on Ajax-enabled forms in order to allow the Ajax calls to access and update interim user input on the server.

When pages are cached for anonymous users (either by Drupal or by an external system), form state may leak between anonymous users. As a consequence there is a chance that interim form input recorded for one anonymous user (which may include sensitive or private information, depending on the nature of the form) will be disclosed to other users interacting with the same form at the same time. This especially affects multi-step Ajax forms because the window of opportunity (i.e. the time span between user input and final form submission) is indeterminable.

This vulnerability is mitigated by the fact that Drupal core does not expose any such forms to anonymous users by default. However, contributed modules or individual sites which leverage the Drupal Form API under the aforementioned conditions might be vulnerable.

If you are facing any problem in upgrading Drupal for this security upgrade, please feel free to share here for discussion.

DrupalHK

Group categories

HKDUG Vocabulary

Group notifications

This group offers an RSS feed. Or subscribe to these personalized, sitewide feeds:

Hot content this week