- Advisory ID: DRUPAL-SA-CONTRIB-2012-031
- Projects: UC PayDutchGroup / WeDeal payment, Multisite Search (third-party modules)
- Version: 6.x
- Date: 2012-March-7
- Security risk: Critical
- Exploitable from: Remote
- Vulnerability: Information Disclosure
UC PayDutchGroup / WeDeal payment integrates the PayDutchGroup / WeDeal payment gateway with Ubercart. The module exposes account credentials for the store's PayDutchGroup account under certain circumstances allowing a malicious user to login to the PayDutchGroup site as the store owner and manage the store owner's account. The vulnerability is mitigated by an attacker needing to gain an account with the ability to checkout of the store.
Multisite Search allows you to index and search content from all sites in a Multisite configuration. The module doesn't sufficiently escape user input when constructing queries. The vulnerability is mitigated by the fact that in order to execute arbitrary sql injection malicious users must have the ability to administer multisite search.
All versions of UC PayDutchGroup / WeDeal payment are affected by vulnerabilities.
All versions of Multisite Search payment are affected by vulnerabilities.
Drupal core is not affected. If you do not use one of the contributed modules listed above, there is nothing you need to do.
Users of thes modules are encouraged to disable the modules and search for similar alternatives. Users of the module who wish to take over maintainership should post patches to the issue queue to fix the security issues and request maintenance following the Unsupported project process
- UC PayDutchGroup / WeDeal payment issue reported by Rolf Meijer
- Multisite Search issue reported by Justin Klein Keane
No fixes created.
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact.