lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed,  6 Jun 2012 21:08:15 +0000 (UTC)
From: security-news@...pal.org
To: security-news@...pal.org
Subject: [Security-news] SA-CONTRIB-2012-096 - Authoring
	HTML - Cross Site	Scripting (XSS)

View online: http://drupal.org/node/1619852

  * Advisory ID: DRUPAL-SA-CONTRIB-2012-096
  * Project: Authoring HTML [1] (third-party module)
  * Version: 6.x
  * Date: 2012-June-06
  * Security risk: Moderately critical [2]
  * Exploitable from: Remote
  * Vulnerability: Cross Site Scripting

-------- DESCRIPTION  
---------------------------------------------------------

This module creates an input format suitable for use within a WYSIWYG editor.
It adds support for the iframe HTML tag, making it friendly with the popular
iframe embeds available in popular video sites like YouTube and Vimeo. It
supports the script tag too. Both tags will only be allowed if the referred
URL is whitelisted. By default, you can refer some well known video sites in
the iframe tag and any site with the tag.

The module doesn't sufficiently verify the whitelisted hosts. This allows an
attacker to register and use a malicious host, bypassing verification.

This vulnerability is mitigated by the fact that an attacker must have a role
authorized to use the "Authoring HTML" input format.

CVE: Requested

-------- VERSIONS AFFECTED  
---------------------------------------------------

  * Authoring HTML 6.x-1.x versions prior to 6.x-1.1.

Drupal core is not affected. If you do not use the contributed Authoring HTML
[3] module, there is nothing you need to do.

-------- SOLUTION  
------------------------------------------------------------

Install the latest version:

  * If you use the Authoring HTML module for Drupal 6.x, upgrade to Authoring
    HTML 6.x-1.1 [4]

Also see the Authoring HTML [5] project page.

-------- REPORTED BY  
---------------------------------------------------------

  * Eriksen Costa [6] the module maintainer

-------- FIXED BY  
------------------------------------------------------------

  * Eriksen Costa [7] the module maintainer
  * Matt Chapman [8] of the Drupal Security Team

-------- COORDINATED BY  
------------------------------------------------------

  * Matt Chapman [9] of the Drupal Security Team
  * Greg Knaddison [10] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION  
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [11].

Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].


[1] http://drupal.org/project/authoring_html
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/project/authoring_html
[4] http://drupal.org/node/1619086
[5] http://drupal.org/project/authoring_html
[6] http://drupal.org/user/215266
[7] http://drupal.org/user/215266
[8] http://drupal.org/user/143172
[9] http://drupal.org/user/143172
[10] http://drupal.org/user/36762
[11] http://drupal.org/contact
[12] http://drupal.org/security-team
[13] http://drupal.org/writing-secure-code
[14] http://drupal.org/security/secure-configuration

_______________________________________________
Security-news mailing list
Security-news@...pal.org
http://lists.drupal.org/mailman/listinfo/security-news

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ