Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] SA-CONTRIB-2012-023 - FAQ - Cross Site Scripting

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] SA-CONTRIB-2012-023 - FAQ - Cross Site Scripting


Chronologisch Thread 
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] SA-CONTRIB-2012-023 - FAQ - Cross Site Scripting
  • Date: Wed, 22 Feb 2012 22:59:33 +0000 (UTC)
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>

* Advisory ID: DRUPAL-SA-CONTRIB-2012-023
* Project: Frequently Asked Questions [1] (third-party module)
* Version: 6.x
* Date: 2012-February-22
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting

-------- DESCRIPTION
---------------------------------------------------------

The Frequently Asked Questions (faq) module allows users, with the
appropriate permissions, to create question and answer pairs which are
displayed on the 'faq' page, and in the random and recent FAQ blocks. The
module does not sanitize some of the user-supplied data before displaying it,
leading to a Cross Site Scripting (XSS [3]) vulnerability. This vulnerability
is mitigated by the fact that the attacker must have a role with the
'administer faq', 'create faq', 'edit faq' or 'edit own faq' permissions. If
using the FAQ module with the FAQ Ask module, the attacker may also exploit
the vulnerability if they have the 'ask question' permission.

-------- VERSIONS AFFECTED
---------------------------------------------------

* Frequently Asked Questions 6.x-1.x versions prior to 6.x-1.13 [4].

Drupal core is not affected. If you do not use the contributed Frequently
Asked Questions [5] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

* If you use the FAQ module for Drupal 6.x, upgrade to FAQ 6.x-1.13 [6]

See also the Frequently Asked Questions [7] project page.

-------- REPORTED BY
---------------------------------------------------------

* phdruplover [8]

-------- FIXED BY
------------------------------------------------------------

* Stella Power [9] the module maintainer and member of the Drupal Security
Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [10].

Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].


[1] http://drupal.org/project/faq
[2] http://drupal.org/security-team/risk-levels
[3] http://en.wikipedia.org/wiki/Cross-site_scripting
[4] http://drupal.org/node/1451186
[5] http://drupal.org/project/faq
[6] http://drupal.org/node/1451186
[7] http://drupal.org/project/faq
[8] http://drupal.org/user/1505850
[9] http://drupal.org/user/66894
[10] http://drupal.org/contact
[11] http://drupal.org/security-team
[12] http://drupal.org/writing-secure-code
[13] http://drupal.org/security/secure-configuration

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
http://lists.drupal.org/mailman/listinfo/security-news



  • [IT-SecNots] [Security-news] SA-CONTRIB-2012-023 - FAQ - Cross Site Scripting, security-news, 23.02.2012

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang