it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] SA-CONTRIB-2011-042 Views Bulk Operations - Cross Site Scripting
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] SA-CONTRIB-2011-042 Views Bulk Operations - Cross Site Scripting
- Date: Wed, 21 Sep 2011 21:35:20 +0000 (UTC)
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
* Advisory ID: DRUPAL-SA-CONTRIB-2011-042
* Project: Views Bulk Operations (VBO) [1] (third-party module)
* Version: 6.x
* Date: 2011-September-21
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Views Bulk Operations (VBO) module allows actions and rules to be run on
the selected views rows (nodes, terms, user, etc). It also bundles several
convenient actions. One of those actions allows the bulk modification of
taxonomy terms on a node.
When using the "Modify node taxonomy terms" action to modify taxonomy, and
the vocabulary has user tagging enabled, the vocabulary help (if any) is
shown without being filtered first, leading to a cross site scripting
vulnerability.
This vulnerability is mitigated by the fact that it normally requires the
'administer taxonomy' permission in order to exploit it.
-------- VERSIONS AFFECTED
---------------------------------------------------
Versions prior to 6.x-1.11
Drupal core is not affected. If you do not use the contributed Views Bulk
Operations (VBO) [3] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Views Bulk Operations module for Drupal 6.x, upgrade to
6.x-1.11 [4]
See also the Views Bulk Operations (VBO) [5] project page.
-------- REPORTED BY
---------------------------------------------------------
* Jim Berry [6]
-------- FIXED BY
------------------------------------------------------------
* Karim Ratib [7] the module maintainer
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [8].
Learn more about the Drupal Security team and their policies [9], writing
secure code for Drupal [10], and securing your site [11].
[1] http://drupal.org/project/views_bulk_operations
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/project/views_bulk_operations
[4] http://drupal.org/node/1286778
[5] http://drupal.org/project/views_bulk_operations
[6] http://drupal.org/user/240748
[7] http://drupal.org/user/48424
[8] http://drupal.org/contact
[9] http://drupal.org/security-team
[10] http://drupal.org/writing-secure-code
[11] http://drupal.org/security/secure-configuration
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
http://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] SA-CONTRIB-2011-042 Views Bulk Operations - Cross Site Scripting, security-news, 21.09.2011
Archiv bereitgestellt durch MHonArc 2.6.19.