Drupal Released Security Updates for Drupal 6.x and 7.x

Recently, Drupal has released security updates for Drupal 6.x and Drupal 7.x. All the site owners, who are using Drupal based website, can review the solutions and maintain their site wonderfully. For all the site owners, it is recommended that schedule this upgrade within the next 7 – 14 days so that they get the benefit of security updates.

There are lots of vulnerabilities that are fixed in the supported Drupal core versions 6 as well as 7. Various users are feeling string as this update illustrates the value of Drupal and Open Source as it can be easily take as challenge to talk to your customers about this.
Let’s have a look on multiple vulnerabilities that has been fixed:

Cross-site request forgery protection:

As we all know that Drupal’s form has been built in cross-site requiest forgery validation and it enables any type of module to perform its own validation on the form. In some cases, form validation functions unsafe operations, but the validation of Drupal core form API has been changed in this release so that it can be easily skips subsequent validation if the CSRF validation fails. There are various other issues that has been faced by lots of people, therefore will also be fixed by this Drupal core release.

Fault in pseudorandom number generation using mt_rand:

When it comes to mt_rand(), Drupal core directly make use of mt_rand()pseudorandom number generator for developing security related strings used in various core modules.
Drupal core directly used the mt_rand() pseudorandom number generator for generating security related strings used in several core modules. It was found that brute force tools could determine the seeds making these strings predictable under certain circumstances.
Moreover, this vulnerability has no mitigation as all the Drupal websites are affected until the security update has been applied.

Access bypass:

For invalid tokens, the function drupal_valid_token() can be returned as if the caller does not ensure that the token is a string. Mainly, this vulnerability is assuaged by the truth that contributed or custom module must invoke drupal_validate_token() with an argument that can be manipulated to not be cord by an attacker. Presently, there is no known core or contributed module, which suffer from this vulnerability.

Cross-site Scripting (Image Module):

Before they are printed to HTML, Image file descriptions are not only properly sanitized so exposing a cross-site scripting vulnerability. This vulnerability is alleviated by the fact that an attacker must have a permission to administer field descriptions.

Cross-site scripting (Color module):

In the color module, a cross-website scripting vulnerability was found; however, a malicious attacker could deception and genuine administrative user into visiting a page containing specific JavaScript that can lead to reflected cross-site scripting attack through JavaScript execution in CSS. This vulnerability can also alleviated by the fact that it can take place in older browsers and in restricted set of modern browsers.

So, these are some of the major security updates released by Drupal for Drupal 6.x and 7.x, so all the users can get benefit of these security updates and enjoy a lot. To get more information on Drupal development, you can click here.

As we all know that Drupal has released security updates for Drupal 6.x and 7.x so users can get many security features and get lots of benefits. In this blog, you can get in-depth information about the security updates, so continue reading this blog…