Multiple vulnerabilities and weaknesses were discovered in Drupal.
.... Reflected cross site scripting vulnerability in error handler
A reflected cross site scripting vulnerability was discovered in Drupal's error handler. Drupal displays PHP errors in the messages area, and a specially crafted URL can cause malicious scripts to be injected into the message. The issue can be mitigated by disabling on-screen error display at admin/settings/error-reporting. This is the recommended setting for production sites.
This issue affects Drupal 6.x only.
.... Cross site scripting vulnerability in Color module
When using re-colorable themes, color inputs are not sanitized. Malicious color values can be used to insert arbitrary CSS and script code. Successful exploitation requires the "Administer themes" permission.
This issue affects Drupal 6.x and 7.x.
.... Access bypass in File module
When using private files in combination with a node access module, the File module allows unrestricted access to private files.
This issue affects Drupal 7.x only.
Install the latest version:
The Security Team has released both a pure security update without other bug fixes and a security update combined with other bug fixes and improvements. You can choose to either only include the security update for an immediate fix (which might require less quality assurance and testing) or more fixes and improvements alongside the security fixes by choosing between Drupal 7.1  and Drupal 7.2  or Drupal 6.21  and Drupal 6.22 .
See the release announcement  for more information.
See also the Drupal core  project page.
(*) Member of the Drupal security team.
Learn more about the Drupal Security team and their policies , writing secure code for Drupal , and securing your site .
 http://drupal.org/project/drupal  http://drupal.org/security-team/risk-levels  http://drupal.org/node/1168910  http://drupal.org/node/1168946  http://drupal.org/node/1168908  http://drupal.org/node/1168950  http://drupal.org/node/1168910  http://drupal.org/node/1168946  http://drupal.org/node/1168908  http://drupal.org/node/1168950  http://drupal.org/drupal-7.2  http://drupal.org/project/drupal  http://drupal.org/user/17943  https://drupal.org/user/309898  http://drupal.org/user/52142  http://drupal.org/user/17943  http://drupal.org/user/49851  http://drupal.org/user/17943  http://drupal.org/contact  http://drupal.org/security-team  http://drupal.org/writing-secure-code  http://drupal.org/security/secure-configuration
Security-news mailing list Securityemail@example.com http://lists.drupal.org/mailman/listinfo/security-news
Require php 5.3.
Please login to add feedback.