[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20120321172135.D54031D005B@www1.drupal.org>
Date: Wed, 21 Mar 2012 17:21:35 +0000 (UTC)
From: security-news@...pal.org
To: security-news@...pal.org
Subject: [Security-news] SA-CONTRIB-2012-042 - Wishlist
Cross Site Scripting (XSS)
* Advisory ID: DRUPAL-SA-CONTRIB-2012-042
* Project: Wishlist Module [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-March-21
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Cross Site Request Forgery
-------- DESCRIPTION
---------------------------------------------------------
The Wishlist Module allows users to maintain shared wishlists for special
events and holidays.
Impact:
The module doesn't sufficiently filter user supplied text from the URL. This
can be used to perform a reflected cross site scripting (XSS) attack. User
account credentials could be exposed or compromised, or users could be
redirected to sites designed for phishing or hosting malware. This
vulnerability is mitigated by the fact that users must be tricked into
visiting a specific link and then manipulating the show/hide purchase details
drop down. This drop down is only rendered if the user is viewing their own
Wish List and the module is configured to hide the purchased status from
them.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Wishlist Module 6.x-2.x versions prior to 6.x-2.6.
* Wishlist Module 7.x-2.x versions prior to 7.x-2.6.
Drupal core is not affected. If you do not use the contributed Wishlist
Module [3] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Wishlist module for Drupal 6.x, upgrade to Wishlist 6.x-2.6
[4]
* If you use the Wishlist module for Drupal 7.x, upgrade to Wishlist 7.x-2.6
[5]
See also the Wishlist Module [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Justin Klein Keane [7]
-------- FIXED BY
------------------------------------------------------------
* Scott McLewin [8] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [9] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].
[1] http://drupal.org/project/wishlist
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/project/wishlist
[4] http://drupal.org/node/1483634
[5] http://drupal.org/node/1483636
[6] http://drupal.org/project/wishlist
[7] http://drupal.org/user/302225
[8] http://drupal.org/user/33718
[9] http://drupal.org/user/36762
[10] http://drupal.org/contact
[11] http://drupal.org/security-team
[12] http://drupal.org/writing-secure-code
[13] http://drupal.org/security/secure-configuration
_______________________________________________
Security-news mailing list
Security-news@...pal.org
http://lists.drupal.org/mailman/listinfo/security-news
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists