Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] SA-CONTRIB-2012-079 - Post Affiliate Pro - Cross Site Scripting (XSS) and Access Bypass - Unsupported

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] SA-CONTRIB-2012-079 - Post Affiliate Pro - Cross Site Scripting (XSS) and Access Bypass - Unsupported


Chronologisch Thread 
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] SA-CONTRIB-2012-079 - Post Affiliate Pro - Cross Site Scripting (XSS) and Access Bypass - Unsupported
  • Date: Wed, 16 May 2012 18:51:54 +0000 (UTC)
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>

View online: http://drupal.org/node/1585648

* Advisory ID: DRUPAL-SA-CONTRIB-2012-079
* Project: Post Affiliate Pro [1] (third-party module)
* Version: 6.x
* Date: 2012-May-16
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Access bypass

-------- DESCRIPTION
---------------------------------------------------------

CVE: Requested.
Post Affiliate Pro (PAP) is a module providing affiliate functionality for
Ubercart and Post Affiliate Pro application.
The module doesn't sufficiently filter user supplied text provided by users
registering on the site and also allows unauthorized users to view other
user's commission.

-------- VERSIONS AFFECTED
---------------------------------------------------

* All versions of the module.

Drupal core is not affected. If you do not use the contributed Post Affiliate
Pro [3] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

The module is no longer supported. Users should disable it. Users interested
in continuing to use it should see the project page for more information.

Also see the Post Affiliate Pro [4] project page.

-------- REPORTED BY
---------------------------------------------------------

* Lee Rowlands [5]

-------- FIXED BY
------------------------------------------------------------

No fix was provided.

-------- COORDINATED BY
------------------------------------------------------

* Michael Hess [6] of the Drupal Security Team
* Greg Knaddison [7] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [8].

Learn more about the Drupal Security team and their policies [9], writing
secure code for Drupal [10], and securing your site [11].


[1] http://drupal.org/project/uc_post_affiliate_pro
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/project/uc_post_affiliate_pro
[4] http://drupal.org/project/uc_post_affiliate_pro
[5] http://drupal.org/user/395439
[6] http://drupal.org/user/102818
[7] http://drupal.org/user/36762
[8] http://drupal.org/contact
[9] http://drupal.org/security-team
[10] http://drupal.org/writing-secure-code
[11] http://drupal.org/security/secure-configuration

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
http://lists.drupal.org/mailman/listinfo/security-news



  • [IT-SecNots] [Security-news] SA-CONTRIB-2012-079 - Post Affiliate Pro - Cross Site Scripting (XSS) and Access Bypass - Unsupported, security-news, 17.05.2012

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang