Drupal Authoring HTML 6.x Cross Site Scripting

2012-06-08 / 2012-08-15
Credit: Eriksen Costa
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 3.5/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 6.8/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Jednorazowa
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

View online: http://drupal.org/node/1619852 * Advisory ID: DRUPAL-SA-CONTRIB-2012-096 * Project: Authoring HTML [1] (third-party module) * Version: 6.x * Date: 2012-June-06 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting -------- DESCRIPTION --------------------------------------------------------- This module creates an input format suitable for use within a WYSIWYG editor. It adds support for the iframe HTML tag, making it friendly with the popular iframe embeds available in popular video sites like YouTube and Vimeo. It supports the script tag too. Both tags will only be allowed if the referred URL is whitelisted. By default, you can refer some well known video sites in the iframe tag and any site with the tag. The module doesn't sufficiently verify the whitelisted hosts. This allows an attacker to register and use a malicious host, bypassing verification. This vulnerability is mitigated by the fact that an attacker must have a role authorized to use the "Authoring HTML" input format. CVE: Requested -------- VERSIONS AFFECTED --------------------------------------------------- * Authoring HTML 6.x-1.x versions prior to 6.x-1.1. Drupal core is not affected. If you do not use the contributed Authoring HTML [3] module, there is nothing you need to do. -------- SOLUTION ------------------------------------------------------------ Install the latest version: * If you use the Authoring HTML module for Drupal 6.x, upgrade to Authoring HTML 6.x-1.1 [4] Also see the Authoring HTML [5] project page. -------- REPORTED BY --------------------------------------------------------- * Eriksen Costa [6] the module maintainer -------- FIXED BY ------------------------------------------------------------ * Eriksen Costa [7] the module maintainer * Matt Chapman [8] of the Drupal Security Team -------- COORDINATED BY ------------------------------------------------------ * Matt Chapman [9] of the Drupal Security Team * Greg Knaddison [10] of the Drupal Security Team -------- CONTACT AND MORE INFORMATION ---------------------------------------- The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [11]. Learn more about the Drupal Security team and their policies [12], writing secure code for Drupal [13], and securing your site [14]. [1] http://drupal.org/project/authoring_html [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/project/authoring_html [4] http://drupal.org/node/1619086 [5] http://drupal.org/project/authoring_html [6] http://drupal.org/user/215266 [7] http://drupal.org/user/215266 [8] http://drupal.org/user/143172 [9] http://drupal.org/user/143172 [10] http://drupal.org/user/36762 [11] http://drupal.org/contact [12] http://drupal.org/security-team [13] http://drupal.org/writing-secure-code [14] http://drupal.org/security/secure-configuration _______________________________________________ Security-news mailing list Security-news@drupal.org http://lists.drupal.org/mailman/listinfo/security-news _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Referencje:

http://drupal.org/node/1619852


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top