Drupal 6.x before 6.34 and 7.x before 7.34 allows remote attackers to hijack sessions via a crafted request, as demonstrated by a crafted request to a server that supports both HTTP and HTTPS sessions.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2014/11/20/3 | third party advisory mailing list |
https://www.drupal.org/SA-CORE-2014-006 | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/11/20/21 | third party advisory mailing list |
http://secunia.com/advisories/59164 | third party advisory |
http://secunia.com/advisories/59814 | third party advisory |
http://www.debian.org/security/2014/dsa-3075 | third party advisory vendor advisory |