it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecurityNotifies] [Security-news] SA-CONTRIB-2010-072: Hierarchical Select - Cross Site Scripting
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecurityNotifies] [Security-news] SA-CONTRIB-2010-072: Hierarchical Select - Cross Site Scripting
- Date: Wed, 7 Jul 2010 18:54:31 +0000 (UTC)
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
* Advisory ID: DRUPAL-SA-CONTRIB-2010-0XX
* Project: Hierarchical Select (third-party module)
* Version: 5.x, 6.x
* Date: 2010-July-07
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Hierarchical Select module provides a "hierarchical_select" form element,
which is a greatly enhanced way for letting the user select items in a
taxonomy. The module does not sanitize some of the user-supplied data before
displaying it, leading to a Cross Site Scripting (XSS [1]) vulnerability that
may lead to a malicious user gaining full administrative access. This
vulnerability is mitigated by the fact that the attacker must have a role
with the 'administer taxonomy' permission.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Hierarchical Select module for Drupal 5.x versions prior to 5.x-3.2
* Hierarchical Select module for Drupal 6.x versions prior to 6.x-3.2
Drupal core is not affected. If you do not use the contributed Hierarchical
Select [2] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Hierarchical Select module for Drupal 5.x upgrade to
Hierarchical Select 5.x-3.2 [3]
* If you use the Hierarchical Select module for Drupal 6.x upgrade to
Hierarchical Select 6.x-3.2 [4]
See also the Hierarchical Select project page [5].
-------- REPORTED BY
---------------------------------------------------------
* Jingxiang Rao [6]
* Sam Oldak
-------- FIXED BY
------------------------------------------------------------
* Wim Leers [7], the module maintainer
* Sam Oldak
-------- CONTACT
-------------------------------------------------------------
The Drupal security team [8] can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/project/hierarchical_select
[3] http://drupal.org/node/847286
[4] http://drupal.org/node/847284
[5] http://drupal.org/project/hierarchical_select
[6] http://drupal.org/user/623328
[7] http://drupal.org/user/99777
[8] http://drupal.org/security-team
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
http://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecurityNotifies] [Security-news] SA-CONTRIB-2010-072: Hierarchical Select - Cross Site Scripting, security-news, 07.07.2010
Archiv bereitgestellt durch MHonArc 2.6.19.