Drupal 6.16 with Context 6.x-2.0-rc3 XSS

2010-05-20 / 2010-05-21
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 2.1/10
Impact Subscore: 2.9/10
Exploitability Subscore: 3.9/10
Exploit range: Remote
Attack complexity: High
Authentication: Single time
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Details of this disclosure may be found at: http://www.madirish.net/?article=457 CVE-2010-1584 Description of Vulnerability: - ----------------------------- Drupal (http://drupal.org) is a robust content management system (CMS) written in PHP and MySQL. The Drupal Context module (http://drupal.org/project/context) "allows you to manage contextual conditions and reactions for different portions of your site." The Context module contains a cross site scripting (XSS) vulnerability because it fails to sanitize block descriptions before display. Systems affected: - ----------------- Drupal 6.16 with Context 6.x-2.0-rc3 was tested and shown to be vulnerable. Impact - ------ User could inject arbitrary scripts into pages affecting site users. This could result in administrative account compromise leading to web server process compromise. Mitigating factors: - ------------------- In order to execute arbitrary script injection malicious users must have 'Administer blocks' permission. Technical discussion and proof of concept: - ------------------------------------------ Users with 'administer blocks' permission can insert arbitrary script in block descriptions which is rendered by the Context module at ?q=admin/build/context/X where X is the block id. Vendor Response: - ---------------- Drupal security responds that they do not coordinate security fixes for modules in release candidate designation. Vulnerability was reported to the module maintainer via the public issue queue at the direction of Drupal security. - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can be confirmed using the public key at http://www.madirish.net/gpgkey -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iPwEAQECAAYFAkvoBWEACgkQkSlsbLsN1gAsZAb9GrhJSfSKKF4hM14iBIh8TKA0 ZYwv1RihbRVWyx8V+j0yUrFhQRqBZQe2FDiBvI1fnKbHCg8aulIZvPnCQfd98kkX C/aAS5zNOtnAcD3cRq+Wk0Ly/Cbdv+sWatpewj/7JQqvSrilNsgwEksTtwi+27MM 4p5ndYMEwhk8jZZ/GgshfG4h4JU4eB1tLFF/Peu96OYZlTPVn8qh9ZzcbmjjOiMO mGgqCNBuNZxfpGEp4xUdeLLJUEwa88D3M+b91RRn/z15ZQ2gy1WGnquPEWWhc5bd nyZBm4OvkFoPMBp4jRY= =nOaL -----END PGP SIGNATURE-----


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top