[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1328796296.2254.7.camel@localhost>
Date: Thu, 09 Feb 2012 09:04:56 -0500
From: Justin Klein Keane <justin@...irish.net>
To: Full Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Drupal Finder Module Multiple Vulnerabilities
Vulnerability Report
Description of Vulnerability:
-----------------------------
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL. The Drupal Finder module
(https://drupal.org/project/finder) "allows Drupal site administrators
to create flexible faceted search forms to find entities such as nodes
or users based on the values of fields and database attributes." The
Finder module contains multiple vulnerabilities including persistent
cross site scripting (XSS) and an arbitrary code execution
vulnerability.
Systems affected:
-----------------------------
Drupal 6.22 with Finder 6.x-1.9 was tested and shown to be vulnerable
Impact
-----------------------------
Users can execute code with the permissions of the web server. Malicious
users could inject arbitrary HTML into search results that could display
to all users.
Mitigating factors:
-----------------------------
In order to execute arbitrary code execution malicious users must have
the ability to import finders. In order to execute arbitrary script
injection malicious users must have the ability to create content.
Proof of Concept Exploit (Code Execution):
------------------------------------------
1. Install and enable the Finder modules
2. Enter '$a = phpinfo()' in the form at ?q=admin/build/finder/import
3. Submit the form to view the executed code
Proof of Concept Exploit (XSS):
------------------------------------------
1. Install and enable the Finder modules
2. At ?q=node/add/story create a new node with the title
"<script>alert('xss');</script>" and save it
3. Create a new "Node finder" using the drop down at the bottom of the
page ?q=admin/build/finder
4. Check 'Provide block' and select "Autocomplete textfield" from the
'Add element' drop down
5. Save the new finder using the button at the bottom of the form
6. In the resulting configuration scree
(?q=admin/build/finder/X/edit/2/edit/ where X is the Finder ID) select
"Node:Title" from the 'Find items by this field:' select list and click
'Save finder element'
7. Enable the new Finder block at ?q=admin/build/block
8. Type 'xss' into the Finder block to view the rendered JavaScript
Vendor Response:
-----------------------------
Upgrade to the latest version of Finder. SA-CONTRIB-2012-017
(https://drupal.org/node/1432970)
Text of this advisory also available at
http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities
--
Justin Klein Keane
http://www.MadIrish.net
Download attachment "signature.asc" of type "application/pgp-signature" (447 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists