it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] SA-CONTRIB-2011-046
- Date: Wed, 5 Oct 2011 18:48:58 +0000 (UTC)
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
* Advisory ID: DRUPAL-SA-CONTRIB-2011-046
* Project: Echo [1] (third-party module)
* Version: 6.x, 7.x, 8.x
* Date: 2011-October-05
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Multiple vulnerabilities
-------- DESCRIPTION
---------------------------------------------------------
The Echo module generates a fully-themed Drupal page, returning the rendered
page as a text string and allowing other modules to style an HTML message as
if it had been generated by the live website.
The module does not properly sanitize user-supplied content, resulting in a
Cross-Site Scripting (XSS [3]) vulnerability. Additionally, the module allows
arbitrary content passed via the URL to be embedded on the site, rendering
the site vulnerable to phishing [4] exploits.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Echo 6.x-1.x versions prior to 6.x-1.7 [5].
* Echo 7.x-1.x versions prior to 7.x-1.7 [6].
* Echo 8.x-1.x versions prior to 8.x-1.7 [7].
Drupal core is not affected. If you do not use the contributed Echo [8]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Echo module for Drupal 6.x, upgrade to Echo 6.x-1.7 [9].
* If you use the Echo module for Drupal 7.x, upgrade to Echo 7.x-1.7 [10].
* If you use the Echo module for Drupal 8.x, upgrade to Echo 8.x-1.7 [11].
See also the Echo [12] project page.
-------- REPORTED BY
---------------------------------------------------------
* Francesco Placella (plach [13])
-------- FIXED BY
------------------------------------------------------------
* Bob Vincent (pillarsdotnet [14]) the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* mr.baileys [15] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [16].
Learn more about the Drupal Security team and their policies [17], writing
secure code for Drupal [18], and securing your site [19].
[1] http://drupal.org/project/echo
[2] http://drupal.org/security-team/risk-levels
[3] http://en.wikipedia.org/wiki/Cross-site_scripting
[4] http://en.wikipedia.org/wiki/Phishing
[5] http://drupal.org/node/1274528
[6] http://drupal.org/node/1274530
[7] http://drupal.org/node/1274532
[8] http://drupal.org/project/echo
[9] http://drupal.org/node/1274528
[10] http://drupal.org/node/1274530
[11] http://drupal.org/node/1274532
[12] http://drupal.org/project/echo
[13] http://drupal.org/user/183211
[14] http://drupal.org/user/36148
[15] http://drupal.org/user/383424
[16] http://drupal.org/contact
[17] http://drupal.org/security-team
[18] http://drupal.org/writing-secure-code
[19] http://drupal.org/security/secure-configuration
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
http://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] SA-CONTRIB-2011-046, security-news, 05.10.2011
Archiv bereitgestellt durch MHonArc 2.6.19.