it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] SA-CONTRIB-2014-083 - Rules Link - Cross Site Scripting (XSS)
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] SA-CONTRIB-2014-083 - Rules Link - Cross Site Scripting (XSS)
- Date: Wed, 27 Aug 2014 19:11:51 +0000 (UTC)
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
View online: https://www.drupal.org/node/2328567
* Advisory ID: DRUPAL-SA-CONTRIB-2014-083
* Project: Rules Link [1] (third-party module)
* Version: 7.x
* Date: 2014-August-27
* Security risk: 9/25 ( Less Critical)
AC:Complex/A:Admin/CI:None/II:All/E:Theoretical/TD:25 [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
This module allows you to create links which trigger arbitrary functionality
with the help of the Rules module.
The module doesn't sufficiently sanitize the question and description strings
when confirmation forms are displayed for triggering Rules links.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer rules links".
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Rules Link 7.x-1.x versions prior to 7.x-1.1.
Drupal core is not affected. If you do not use the contributed Rules Link [4]
module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Rules Link module for Drupal 7.x, upgrade to Rules Link
7.x-1.1 [5]
Also see the Rules Link [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Klaus Purer [7] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Klaus Purer [8] of the Drupal Security Team
-------- COORDINATED BY
------------------------------------------------------
* Klaus Purer [9] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11],
writing secure code for Drupal [12], and securing your site [13].
[1] https://www.drupal.org/project/rules_link
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/rules_link
[5] https://www.drupal.org/node/2328549
[6] https://www.drupal.org/project/rules_link
[7] https://www.drupal.org/user/262198
[8] https://www.drupal.org/user/262198
[9] https://www.drupal.org/user/262198
[10] https://www.drupal.org/contact
[11] https://www.drupal.org/security-team
[12] https://www.drupal.org/writing-secure-code
[13] https://www.drupal.org/security/secure-configuration
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] SA-CONTRIB-2014-083 - Rules Link - Cross Site Scripting (XSS), security-news, 27.08.2014
Archiv bereitgestellt durch MHonArc 2.6.19.