• Advisory ID: DRUPAL-SA-2010-002-CORE
  • Project: Drupal core
  • Version: 5.x, 6.x
  • Date: 11-August-2010
  • Security risk: Critical
  • Exploitable from: Remote
  • Vulnerability: Multiple vulnerabilities


Multiple vulnerabilities and weaknesses Were discovered in Drupal.

OpenID authentication bypass

The OpenID module Provides users the ability to login to sites using an OpenID account.

The OpenID module Does not Implement all the required verifications from the OpenID 2.0 protocol and is Vulnerable to a number of attacks.

– Should OpenID to Verify That "openid.response_nonce" has not Already Been Used for an assertion by the OpenID provider
– Should OpenID verify the value of openid.return_to as Obtained from the OpenID provider
– OpenID That must verify all fields That are required to be signed are signed

These specification Violations allow malicious sites to harvest positive assertions from OpenID providers and use Them on OpenID sites using the module to Obtain access to accounts Preexisting bound to the harvested OpenIDs. Intercepted Also assertions from OpenID providers can be replayed and used to Obtain access to user accounts bound to the intercepted OpenIDs.

This Issue Affects Drupal 6.x only. A separate security announcement and release is published for the Contributed OpenID module for Drupal 5.x

File download access bypass

The upload module Allows users to upload files and Provides access checking for file downloads.

The module looks up files for download in the database and download after Serves Them for access checking. However, it does not account for the fact That Certain database configurations will not account apartments Differences in file names. If a malicious user uploads a file Which differs only in letter case, access will be Granted for the Earlier upload files regardless of actual access to that.

This Issue Affects Drupal 5.x and 6.x.

Comment unpublishing bypass

The comment module Allows users to leave comments on content on the site.

The module Supports unpublishing comments by privileged users. Users with the "post comments without approval ‘permission However Could craft a URL Which Allows Them to republish previously unpublished comments.

This Issue Affects Drupal 5.x and 6.x.

Actions cross site scripting

The feature combined with Drupal’s actions trigger module Allows users to configure Un certain actions to happen When users register, content is submitted, and so on, through a web based interface.

Users with "Administer permission actions" can enter action descriptions and Which Are Not Properly filtered messages on output. Users with content and taxonomy tag submission permissions can create nodes and taxonomy terms Which Are Not Properly sanitized for inclusion in action messages and inject arbitrary HTML and script code into Drupal pages. Such a cross-site scripting attack May Lead to Gaining the malicious user administrative access. Wikipedia has more information about cross-site scripting (XSS).

This Issue Affects Drupal 6.x only.

Versions affected

  • Drupal 6.x before version 6.18 or 6.19.
  • Drupal 5.x before version 5.23.


Install the latest version:

Drupal 5 will no Longer be maintained When Drupal 7 is released . Upgrading to Drupal 6 is recommended.

The security team starts a new practice of releasing Both also to other bugfixes and security updates without a security update combined with other bug fixes and improvements. Either you can choose to only include the security update for an immediate fix (Which Might require less testing and quality assurance) or more fixes and improvements alongside the security fixes by choosing Drupal Between 6.18 and Drupal 6.19. Read the announcement for more information.

Reported by

The OpenID authentication bypass issues Were Reported by Johnny Bufu , Christian Schmidt and Heine Deelstra (*).
The file download access bypass Was Reported by Wolfgang Ziegler .
The comment unpublish bypass issue Was Reported by Heine Deelstra (*).
The actions module cross-site scripting Was Reported by Justin Klein Keane and Heine Deelstra (*).

(*) Member of the Drupal security team.

Fixed by

Were the OpenID authentication issues fixed by Christian Schmidt , Heine Deelstra (*) and Damien Tournoud (*).
The file download access bypass Was fixed by Dave Reid (*) and Neil Drumm (*).
The comment unpublish bypass issue Was fixed by Heine Deelstra (*).
The actions module cross-site scripting Was fixed by Justin Klein Keane and Heine Deelstra (*).

(*) Member of the Drupal security team.


The security team for Drupal can be Reached at security at drupal.org or via the form at http://drupal.org/contact .