Vulnerabilidad en Módulo Chaos Tool Suite (CTools) de Drupal (CVE-2010-1546)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-94
Control incorrecto de generación de código (Inyección de código)
Fecha de publicación:
21/05/2010
Última modificación:
11/04/2025
Descripción
Multiples vulnerabilidades en eval (evaluación directa de código dinámico) en la funcionalidad "import" el módulo Chaos Tool Suite (CTools) v6.x en versiones anteriores a la v6.x-1.4 de Drupal; permiten a usuarios remotos autenticados, con privilegios de "administer page manager" (gestor de página administrador), ejecutar código PHP de su elección a través de la entrada a un área de texto; relacionado con (1) la función page_manager_page_import_subtask_validate en page_manager/plugins/tasks/page.admin.inc y (2) la función page_manager_handler_import_validate de page_manager/page_manager.admin.inc.
Impacto
Puntuación base 2.0
6.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:* | ||
| cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://drupal.org/node/803944
- http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?r1=1.27.2.9&r2=1.27.2.10
- http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?view=log
- http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?r1=1.18.2.6&r2=1.18.2.7
- http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?view=log
- http://seclists.org/fulldisclosure/2010/May/272
- http://secunia.com/advisories/39884
- http://www.madirish.net/?article=458
- http://www.securityfocus.com/bid/40285
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58723
- http://drupal.org/node/803944
- http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?r1=1.27.2.9&r2=1.27.2.10
- http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/page_manager.admin.inc?view=log
- http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?r1=1.18.2.6&r2=1.18.2.7
- http://drupalcode.org/viewvc/drupal/contributions/modules/ctools/page_manager/plugins/tasks/page.admin.inc?view=log
- http://seclists.org/fulldisclosure/2010/May/272
- http://secunia.com/advisories/39884
- http://www.madirish.net/?article=458
- http://www.securityfocus.com/bid/40285
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58723



