* Advisory ID: DRUPAL-SA-CONTRIB-2009-069
* Project: Shared Sign On (third-party module)
* Version: 5.x, 6.x
* Date: 2009 September 30
* Security risk: Critical
* Exploitable from: Remote
* Vulnerability: Multiple vulnerabilities
-------- DESCRIPTION
---------------------------------------------------------
The Shared Sign On module enables users to log into one Drupal site and be
automatically logged into multiple related Drupal sites. The module suffers
multiple vulnerabilities, including Cross Site Request Forgeries (CSRF [1])
and Session fixation problem (Session Fixation [2]). This problem allows an
attacker to hijack the account of a logged in user by tricking them into
visiting a seemingly innocent page.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Versions of Shared Sign On for both Drupal 5.x and Drupal 6.x
Drupal core is not affected. If you do not use the contributed Shared Sign On
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
The Shared Sign On module is marked as un-supported. A separate project
called Single Sign On [3] has been created as a replacement. Download the
Single Sign On module and carefully read the README.txt as there is a risk of
breaking a site if instructions are not carried out correctly.
-------- REPORTED BY
---------------------------------------------------------
* Reported by Jose A. Reyero [4] and Steven Wittens [5].
-------- FIXED BY
------------------------------------------------------------
* Fixed by Steven Wittens [6] of Strutta Inc. and Jakub Suchy [7] of Drupal
Security team and Heine Deelstra [8] of Drupal Security Team.
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Csrf
[2] http://en.wikipedia.org/wiki/Session_fixation
[3] http://drupal.org/project/sso
[4] http://drupal.org/user/4299
[5] http://drupal.org/user/10
[6] http://drupal.org/user/10
[7] http://drupal.org/user/31977
[8] http://drupal.org/user/17943
* Advisory ID: DRUPAL-SA-CONTRIB-2009-068
* Project: Boost (third-party module)
* Version: 6.x-1.*
* Date: 2009-09-30
* Security risk: Low
* Exploitable from: Remote
* Vulnerability: Filesystem Directory Creation
-------- DESCRIPTION
---------------------------------------------------------
The Boost module provides a static file-based cache of Drupal pages for
anonymous users. A vulnerability in the module allows an attacker to create
new directories inside the webroot that the web server can write to. Existing
directories cannot be changed using this vulnerability, but it can be used to
affect the system by creating enough directories to reach the 35,000 limit.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Boost module before version 6.x-1.03
Drupal core is not affected. If you do not use the contributed Boost module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Boost module for Drupal 6.x upgrade to Boost module
6.x-1.03 [1]
-------- REPORTED BY
---------------------------------------------------------
Hans Rossel [2]
-------- FIXED BY
------------------------------------------------------------
Mike Carper [3] the module maintainer.
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org [4]
or via the form at http://drupal.org/contact [5].
[1] http://drupal.org/node/592470
[2] http://drupal.org/user/39422
[3] http://drupal.org/user/282446
[4] http://drupal.org
[5] http://drupal.org/contact
* Advisory ID: DRUPAL-SA-CONTRIB-2009-067
* Project: Dex: Contact Information Manager (third-party module)
* Version: 5.x, 6.x
* Date: 2009-Sept-30
* Security risk: Critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Dex: Contact Information Manager module enables contact information
management with Google Maps and Yahoo Maps compatible geocoding. The module
suffers from a Cross Site Scripting (XSS) vulnerability. Such an attack may
lead to a malicious user gaining full administrative access. This module is
no longer maintained. The releases have been unpublished and it is
recommended that it be disabled and uninstalled if in use.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Dex versions 6.x up to and including 6.x-1.0-rc1
* Dex versions 5.x up to and including 5.x-1.0
Drupal core is not affected. If you do not use the contributed Dex module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
There is no solution available. It is recommended that you disable and
uninstall the Dex module if is in use on your site.
-------- REPORTED BY
---------------------------------------------------------
* Reported by Stéphane Corlosquet [1] of the Drupal security team.
-------- HANDLED BY
----------------------------------------------------------
* On behalf of Drupal security team, this SA has been handled by Peter
Wolanin [2], Stéphane Corlosquet [3] and Jakub Suchy [4]
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.
[1] drupal.org/user/52142
[2] http://drupal.org/user/49851
[3] drupal.org/user/52142
[4] http://drupal.org/user/31977
* Advisory ID: DRUPAL-SA-CONTRIB-2009-066
* Project: Organic Groups (third-party module)
* Version: 5.x, 6.x
* Date: 2009-September-30
* Security risk: Moderately Critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Organic Groups (OG) module provides a way to organize users and content
into groups. When displaying group nodes, the module does not properly
sanitize all user-entered text, leading to a cross-site scripting (XSS [1])
vulnerability. Users with permission to create or edit groups nodes (which
may be any node types assigned by the site administrator) may carry out the
attack. Such an attack may lead to a malicious user gaining full
administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Organic Groups 6.x-1.x prior to 6.x-1.4
* Organic Groups 5.x-8.x prior to 5.x-8.1
* Organic Groups 5.x-7.x prior to 5.x-7.4
* Organic Groups 6.x-2.0 existing release is not affected.
Drupal core is not affected. If you do not use the contributed Organic Groups
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Organic Groups for Drupal 6.x-1.x upgrade to OG 6.x-1.4 [2]
* If you use the Organic Groups for Drupal 5.x-8.x upgrade to OG 5.x-8.1 [3]
* If you use the Organic Groups for Drupal 5.x-7.x upgrade to OG 5.x-7.4 [4]
See also the Organic Groups module project page [5].
-------- REPORTED BY
---------------------------------------------------------
John Morahan [6] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
John Morahan [7] and Derek Wright [8], both of the Drupal Security Team.
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/592410
[3] http://drupal.org/node/592412
[4] http://drupal.org/node/592414
[5] http://drupal.org/project/og
[6] http://drupal.org/user/58170
[7] http://drupal.org/user/58170
[8] http://drupal.org/user/46549
* Advisory ID: DRUPAL-SA-CONTRIB-2009-065
* Project: Browscap (third-party module)
* Version: 5.x, 6.x
* Date: 2009-September-30
* Security risk: Critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Browscap module provides a way to identify the visitors to your site
based on the user agent in their browser. It can also record these user agent
strings and provide reports about them. When displaying reports about
visitors, the module does not properly sanitize the user agent strings before
display, leading to a cross-site scripting (XSS [1]) vulnerability. Such an
attack may lead to a malicious user gaining full administrative access.
Mitigating factors: this only impacts sites which use the "Monitor browsers"
feature.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Browscap versions 6.x prior to 6.x-1.1
* Browscap versions 5.x prior to 5.x-1.1
Drupal core is not affected. If you do not use the contributed Browscap
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Browscap for Drupal 6.x upgrade to Browscap 6.x-1.1 [2]
* If you use the Browscap for Drupal 5.x upgrade to Browscap 5.x-1.1 [3]
See also the Browscap module project page [4].
-------- REPORTED BY
---------------------------------------------------------
Greg Knaddison [5] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
Greg Knaddison [6] of the Drupal Security Team with help from Rob Loach [7]
and Mike Ryan [8] and Dave Reid [9] of the Drupal Security Team.
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/592264
[3] http://drupal.org/node/592262
[4] http://drupal.org/project/browscap
[5] http://drupal.org/user/36762
[6] http://drupal.org/user/36762
[7] http://drupal.org/user/61114
[8] http://drupal.org/user/4420
[9] http://drupal.org/user/53892
* Advisory ID: DRUPAL-SA-CONTRIB-2009-064
* Project: Bibliography module (third-party module)
* Version: 6.x
* Date: 2009-September-30
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Bibliography module (also known as Biblio) allows users manage and
display lists of scholarly publications. The Biblio module creates customized
views in order to display these listings, and these listings contain text
entered by users with the 'create biblio' permission. In some cases, the
module does not properly sanitize the text, leading to a cross-site scripting
(XSS [1]) vulnerability. Such an attack may lead to a malicious user gaining
full administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Bibliography module versions 6.x prior to 6.x-1.7
Drupal core is not affected. If you do not use the contributed Bibliography
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Bibliography module for Drupal 6.x upgrade to Bibliography
module 6.x-1.7 [2]
See also the Bibliography module project page [3].
-------- REPORTED BY
---------------------------------------------------------
Justin C. Klein Keane [4]
-------- FIXED BY
------------------------------------------------------------
Ron Jerome [5] the module maintainer.
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/592174
[3] http://drupal.org/project/biblio
[4] http://drupal.org/user/302225
[5] http://drupal.org/user/54997
* Advisory ID: DRUPAL-SA-CONTRIB-2009-063
* Project: XML sitemap (third-party module)
* Version: 5.x
* Date: 2009-September-30
* Security risk: Less critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The XML sitemap module creates a sitemap that conforms to the sitemaps.org
specification. It also allows users with the 'administer site configuration'
permission to add additional custom links to be included in the sitemap. In
the additional links interface, the module does not properly sanitize the
output of the link paths before display, leading to a cross-site scripting
(XSS [1]) vulnerability. Such an attack may lead to a malicious user gaining
full administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* XML sitemap versions 5.x prior to 5.x-1.7
Drupal core is not affected. If you do not use the contributed XML sitemap
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the XML sitemap for Drupal 5.x upgrade to XML sitemap 5.x-1.7
[2]
See also the XML sitemap module project page [3].
-------- IMPORTANT NOTES
-----------------------------------------------------
This vulnerability was publicly disclosed. If you find a security
vulnerability, please contact the Security team rather than posting a public
issue. If you are a module maintainer, do not commit any security-related
code fixes unless you have coordinated with the Security team.
-------- REPORTED BY
---------------------------------------------------------
This vulnerability was publicly disclosed.
-------- FIXED BY
------------------------------------------------------------
Dave Reid [4] of the Drupal Security Team and module co-maintainer.
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/591732
[3] http://drupal.org/project/xmlsitemap
[4] http://drupal.org/user/53892
* Advisory ID: DRUPAL-SA-CONTRIB-2009-062
* Project: Devel (third-party module)
* Version: 5.x, 6.x
* Date: 2009-September-23
* Security risk: Less critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Devel module contains many useful developer functions, such as a query
log and the display of variables. When using the variable editor, the module
does not properly sanitize the output of the variable name before display,
leading to a cross-site scripting (XSS [1]) vulnerability. Such an attack may
lead to a malicious user gaining full administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Devel versions 6.x prior to 6.x-1.18
* Devel versions 5.x prior to 5.x-1.2
Drupal core is not affected. If you do not use the contributed Devel module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Devel for Drupal 6.x upgrade to Devel 6.x-1.18 [2]
* If you use the Devel for Drupal 5.x upgrade to Devel 5.x-1.2 [3]
See also the Devel module project page [4].
-------- REPORTED BY
---------------------------------------------------------
Stéphane Corlosquet [5] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
dmitrig01 [6] of the Drupal Security Team
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/585982
[3] http://drupal.org/node/585988
[4] http://drupal.org/project/devel
[5] http://drupal.org/user/52142
[6] http://drupal.org/user/47566
* Advisory ID: DRUPAL-SA-CONTRIB-2009-061
* Project: Markdown Preview (third-party module)
* Version: 6.x
* Date: 2009 September 23
* Security risk: Less critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Markdown Preview module provides a live preview pane that displays the
rendered HTML output of your Markdown input. When displaying the live
preview, the module does not properly escape user entered data, leading to a
cross-site scripting (XSS [1]) vulnerability. Such an attack may lead to a
malicious user gaining full administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Markdown Preview for Drupal 6.x
Drupal core is not affected. If you do not use the contributed Markdown
Preview module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
The Markdown Preview module has been abandoned and its releases have been
unpublished. It is recommended that it be disabled and removed from your
server if in use. For Markdown live preview functionality for nodes and
comments, use the Live module [2], which properly escapes the user entered
data using the content's current input format. See the Markdown Preview
project page [3] for instructions how to enable Markdown preview
functionality with the Live module [4].
-------- REPORTED BY
---------------------------------------------------------
Reported by David Needham [5].
-------- HANDLED BY
----------------------------------------------------------
On behalf of Drupal security team, this module has been handled by Stéphane
Corlosquet [6], Oleg Terenchuk [7], and Dave Reid [8].
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross_Site_Scripting
[2] http://drupal.org/project/live
[3] http://drupal.org/project/markdownpreview
[4] http://drupal.org/project/live
[5] http://drupal.org/user/191261
[6] http://drupal.org/user/52142
[7] http://drupal.org/user/78134
[8] http://drupal.org/user/53892
* Advisory ID: DRUPAL-SA-CONTRIB-2009-060
* Project: Meta tags / Nodewords (third-party module)
* Version: 6.x
* Date: 2009-September-23
* Security risk: Less critical
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
The Meta tags (also known as Nodewords) module provides meta tags based on
node titles. In certain conditions, the node meta tags were not respecting
access permissions, potentially exposing content not available otherwise.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Meta tags for Drupal 6.x before Meta tags 6.x-1.1
Drupal core is not affected. If you do not use the contributed Meta tags
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Drupal 6.x upgrade to Meta tags 6.x-1.1 [1].
Also see the Meta tags [2] project page.
-------- REPORTED BY
---------------------------------------------------------
Barry Jaspan [3] and Ben Jeavons [4], both of the Drupal Security Team [5]
-------- FIXED BY
------------------------------------------------------------
Alberto Paderno [6], the module co-maintainer
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.
[1] http://drupal.org/node/585706
[2] http://drupal.org/project/nodewords
[3] http://drupal.org/user/46413
[4] http://drupal.org/user/91990
[5] http://drupal.org/security-team
[6] http://drupal.org/user/55077